News

Hackers Thwart Genuine Advantage

Even as Microsoft unveiled the new, mandatory Genuine Advantage 1.0 last week, hackers were prepared to show anyone who wants to bypass the anti-counterfeit device exactly how to do so.

Genuine Advantage 1.0 was supposed to ensure that only computers using a valid copy of Windows are able to access the company's Windows Update and Microsoft Update download sites, as well as the Microsoft Download Center. Unauthorized versions are still allowed to access security downloads.

According to published reports, users can bypass the ActiveX-driven authentication check by pasting a special JavaScript command in the address bar of the browser. This code is freely available on the Web.

The hack cannot be a surprise to Microsoft; several news reports, including this one from EWeek.com, show that security researchers unearthed flaws in the Genuine Advantage verification process months ago.

According to reports, the company is working on a patch, although no official announcement has been made.

About the Author

Becky Nagel is the vice president of Web & Digital Strategy for 1105's Converge360 Group, where she oversees the front-end Web team and deals with all aspects of digital strategy. She also serves as executive editor of the group's media Web sites, and you'll even find her byline on PureAI.com, the group's newest site for enterprise developers working with AI. She recently gave a talk at a leading technical publishers conference about how changes in Web technology may impact publishers' bottom lines. Follow her on twitter @beckynagel.

Featured

  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Secure Hash Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.