Latest posts

The lesson of Sandworm: patched but not protected

You diligently apply each and every patch as soon as it’s released – the Sandworm attack shows us it still doesn’t mean you’re protected from the exploits that those patches are designed to address.

Continue reading

Fixing the fix: Microsoft reissues SChannel patch

We reported previously that many of our users and many people posting to forums across the web were seeing problems caused by last week’s patch for a serious SChannel vulnerability, MS-066 (KB2992611). It turns out the problem was caused not by the actual vulnerability fix, but by the new ciphers that were added to the Transport Layer Security (TLS) implementation by the patch.

Continue reading

Patch Tuesday one week later: update woes and out-of-band patch release

I’m writing this on “Aftermath Tuesday” – one week after this month’s huge slate of patches came down the pike from Microsoft. Reports of various problems with various patches have started to trickle in, and they range from annoying to crippling.

Continue reading

What does USB stand for, Universal Security Breach?

Researchers have come up with new modes of attack and all the user has to do is plug in the USB device.

Continue reading

US-CERT warns iOS users of Masque attack

Last week, researchers with California security company FireEye announced a new bug called Masque and released a video that demonstrates how an iPhone could be compromised through this new attack.

Continue reading

Adobe joins the patch party in a big way

Microsoft isn’t the only software vendor that came out with a gargantuan update release on Patch Tuesday; Adobe joined in, releasing only one update but that update fixes 18 separate vulnerabilities.

Continue reading

In cyberspace, no one can hear your router scream

According to your bandwidth bills, a black hole is a region of the Internet from which cat videos, check-ins, and likes prevent anything, including productivity, from escaping. Let’s take a closer look at some of the black holes that threaten your users and data from cyberspace, and how you can protect your users from them.

Continue reading

Have wireless, will travel

In this article, we’ll take a look at some of the technological innovations that are making travel a little more pleasant.

Continue reading

Why corporate security is needed beyond corporate walls

Laptops are a great target for malicious attackers and some really sophisticated methods are being used. Business laptops should be properly secured and that they are checked for vulnerabilities and missing patches regularly.

Continue reading

November 2014 – Microsoft Patch Tuesday

Microsoft threw us a bit of a curve, releasing “only” 14 of the patches, with two – MS14-068 and MS14-075 – deferred with the label “Release date to be determined”.

Continue reading