An article in SC Magazine recommends that organizations apply this month’s Microsoft patches very quickly. Among the patches: One vulnerability, CVE-2014-6332, had been remotely exploitable for 18 years prior to its patch, and could be used by an attacker to circumvent Microsoft’s free anti-exploitation tool EMET and its Enhanced Protected Mode (EPM) sandbox in Internet […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The US Department of Homeland Security through the Computer Emergency Readiness Team (CERT) at Carnegie Mellon issued an alert to owners of a number of Linksys routers to patch those routers ASAP. The alert referenced two vulnerabilities – the first one allowed anyone on the internet to read or modify sensitive information on the router; […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article in American Banker talks about the fight that all the banks are fighting right now. JP Morgan Chase CEO Jamie Dimon Says the bank plans to double its $250 million annual computer security budget within the next five years. I think Chase understands the problem; Dimon said “It’s about firewall protection, it’s about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Sometimes not using best practices gets us. Other times it is fatal. Check out this article about an admin who had his (or her) entire universe fall down around his/her ankles. The article shows how, in this case, not following best practices was more than a little inconvenient. The admin was reading his email, apparently […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article in the Times a week ago says that the Feds and States want banks and brokerage firms to close some gaping holes in their defenses. What is that gaping hole? OUTSIDE VENDORS! Many people are aware that the suspected source of the Target breach was a small HVAC contractor. They didn’t do anything […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Do you think about the permissions that an app asks for? A recent ITWorld article delves into the subject and while the article was testing Android apps, the issue is a concern, although a somewhat lesser concern, for Windows and iOS apps as well. The issue at hand is that apps ask for certain permissions […]
Continue reading →
[DISPLAY_ACURAX_ICONS]