Today, on the November edition of Patch Tuesday, Microsoft issued 12 security updates addressing a total of 53 vulnerabilities. Four of them are rated critical and the remaining eight are important and the impacted software list is long. While last month’s patch load made 2015 the biggest patch year in recent memory, this month proves there is no slowing down.
This October Patch Tuesday, Microsoft published just six bulletins, three of which are critical but they do cover most commonly used versions of Office and Windows. Four of the six bulletins impact Windows 10 and will be rolled up into the Windows 10 cumulative update. Compared with months past, this is a light month which is good news.
Computer security vendors have been told to raise their game at the Virus Bulletin conference in Prague, and work more closely with vulnerability researchers.
One of the big malware stories of the last few days has been the discovery that legitimate developers had uploaded apps to Apple’s App Store, without realising that their code had been compromised.
The malicious code, known as XcodeGhost, managed to insert itself into the developers’ apps via a circuitous route.
If there’s something which is in high demand from both the common internet criminals and intelligence agencies around the world, it’s a way of easily infecting the iPhones and iPads of individuals.
The proof that there is high demand for a way to remotely and reliably exploit iOS devices, in order to install malware that can spy upon communications and snoop upon a user’s whereabouts,
In the last few years extortion has hit computer users, big time.
Consumers and businesses alike are finding themselves locked out of their computers, or prevented from accessing their valuable data, by ransomware attacks that demand a payment be made to online criminals.
But normally when these malicious attacks are described,
In my previous post I discussed the flurry of Android vulnerabilities which have come to light over the last year or so. TowelRoot, Fake ID, Android Installer Hijacking, Stagefright, and Certifi-gate have been publicly announced. Some of them have been around in Android for years. Creating patches for your Android devices is a long complex path,
In today’s Patch Tuesday, Microsoft released 12 security bulletins, five of which are critical. With this month’s patch load, we can count 105 updates released so far this year which is only one update short of the total number of bulletins released back in 2013. We have already far exceeded last year’s total of 85.
Android security flaws have become more frequent in the news lately. At least one of them, Stagefright, has been quite severe. The worst part is now that these vulnerabilities have publicly disclosed, everyone including cybercriminals are aware of them. The details needed to compromise devices have been published by every level of media,
A cross-site scripting (XSS) flaw on PayPal’s website could have been used by hackers to phish for your login credentials, and even steal your unencrypted card details.
But thankfully the vulnerability was found by a responsible researcher, who informed PayPal about the problem and helped the web’s most popular payment service from being embarrassed by a massive security gaffe.
Industrial Control Systems (ICS) are the computer systems and networks used to control industrial plants and infrastructures. The term includes Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and Programmable Logic Controllers (PLC).
These systems are used in many sectors classified as critical by the U.S. and other governments.
Here’s a very important lesson for system administrators and developers who don’t want data to fall into the wrong hands: change the default settings, or risk leaving your organisation’s servers open to access by unauthorised, external parties.
A study by researchers at Swiss security firm BinaryEdge has scanned the internet on various ports,
Industrial Programmable Logic Controllers (PLCs) are devices used to control key manufacturing and infrastructure systems around the world. A PLC is a fully customizable device which can take just about any data in, perform any combination of logical operations on it, and create an almost unlimited number of output scenarios. They’re common on manufacturing lines to control production machinery.
[Originally published in the Spiceworks IT Community.]
A Google security research paper was recently published on the best safety practices that hundreds of security experts recommend. This paper outlines the results of two surveys — one with 231 security experts, and another with 294 web-users who aren’t security experts — in which both groups were asked what they do to stay safe online.
Yesterday was Patch Tuesday, and – as Optimal Security’s Russ Ernst described – Microsoft released fixes for a smorgasbord of vulnerabilities.
Obviously, it’s important that you roll out the patches as soon as possible, and ensure that your computers and networks are protected against threats which malicious hackers could use to target your systems,