TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSA Cybersecurity Advisory: Patch Remote Desktop Services on Legacy Windows

78 pointsby PatrolXalmost 6 years ago

7 comments

userbinatoralmost 6 years ago
<i>In order to increase resilience against this threat while large networks patch and upgrade, there are additional measures that can be taken</i><p>I&#x27;d say those are the <i>first</i> things that should be done, regardless of the presence of exploits; exposing a port&#x2F;listening service to the Internet you don&#x27;t need, especially one that can remotely give complete control to an attacker, is always a bad idea. Fortunately the majority of computers out there are probably behind a NAT, which helps greatly to keep them from being hacked remotely.<p><i>Disable remote Desktop Services if they are not required. Disabling unused and unneeded services helps reduce exposure to security vulnerabilities overall and is a best practice even without the BlueKeep threat.</i><p>Very good advice --- too bad latest Windows versions have not-so-clearly-described tons of services running by default, many of which phone home in some way, and some of which are nearly impossible to disable...
评论 #20100964 未加载
评论 #20102441 未加载
评论 #20103167 未加载
sitkackalmost 6 years ago
The fact that NSA does so little for cybersecurity is telling. When they say patch something, it probably means it should be national emergency.
评论 #20102533 未加载
nocturnialalmost 6 years ago
I know we should always assume good faith.<p>From all the vulnerabilities they know, they chose to publish one that&#x27;s known and only concerns outdated software. Maybe I&#x27;m too skeptical but when the NSA starts leaking fixes for zero day exploits, I&#x27;ll take them more seriously.
评论 #20104105 未加载
评论 #20104595 未加载
评论 #20104300 未加载
PatrolXalmost 6 years ago
The NSA and GCHQ are really concerned about the BlueKeep vulnerability.<p>It has the potential to do some serious damage.
tastroderalmost 6 years ago
The advisory links to <a href="https:&#x2F;&#x2F;www.nsa.gov&#x2F;Portals&#x2F;70&#x2F;documents&#x2F;what-we-do&#x2F;cybersecurity&#x2F;professional-resources&#x2F;csa-bluekeep_20190604.pdf?ver=2019-06-04-123329-617" rel="nofollow">https:&#x2F;&#x2F;www.nsa.gov&#x2F;Portals&#x2F;70&#x2F;documents&#x2F;what-we-do&#x2F;cybersec...</a> (PDF)<p>I really wonder what the utility for that distribution form is, are there people printing these out? Or is there some requirement for them to generate a document ID that they could not get for plain web&#x2F;HTML documents?
评论 #20101989 未加载
评论 #20102267 未加载
Theodoresalmost 6 years ago
Who has the fear of visiting a URL owned by a three letter agency known for nefarious spying activities?<p>I do!<p>So here is a third party report for anyone else that views three letter agency URLs as having all the appeal of a trip to a virtual leper colony:<p><a href="https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;even-the-nsa-is-urging-windows...</a>
评论 #20101203 未加载
评论 #20101307 未加载
评论 #20100987 未加载
JudgeWapneralmost 6 years ago
<i>You can totally trust our advice for all your digital security needs.</i><p>- your friendly neighborhood intelligence agency.
评论 #20101114 未加载
评论 #20101077 未加载