New Windows JASBUG vulnerability requires immediate attention from systems administrators
Mitigation requires reconfiguration of affected computers in addition to patching.Read More
Mitigation requires reconfiguration of affected computers in addition to patching.Read More
Symantec looked into how attackers use phishing kits to conduct professional-looking, data-stealing campaigns against unsuspecting users.Read More
This month the vendor is releasing nine bulletins covering a total of 56 vulnerabilities. Thirty-seven of this month’s issues are rated ’Critical’.
Read More
In June 2014, we told you about mobile ransomware called Simplocker that actually encrypted files (before Simplocker, mobile ransomware only claimed to encrypt files to scare users into paying). Simplocker infected more than 20,000 unique users, locking Android devices and encrypting files located in the external storage. Then, it asked victims to pay a ransom […]
Revision Note: V1.0 (February 10, 2015): Advisory published.Summary: Microsoft is announcing the availability of an update for supported editions of Windows 7, Windows 8, Windows Server 2008R2 and Windows Server 2012 that expands the Audit Process Crea…
Revision Note: V2.2 (February 10, 2015): Microsoft is announcing that SSL 3.0 fallback attempts are disabled by default in Internet Explorer 11. For more information see Microsoft Knowledge Base Article 3021952.Summary: Microsoft is aware of detailed i…
More easy things you can do to secure your smartphone and tablet. On our blog last week, we shared the first 7 easy security measures to protect your Android devices and the data stored there. But we haven’t finished them. Let’s go a little further. 8. Keep an eye in your phone or, if you […]
More easy things you can do to secure your smartphone and tablet. On our blog last week, we shared the first 7 easy security measures to protect your Android devices and the data stored there. But we haven’t finished them. Let’s go a little further. 8. Keep an eye in your phone or, if you […]
Este Día Internacional del Internet Seguro, conoce cómo reducir la posibilidad de que un malware secuestre tu equipo o información y que te pidan pagar un rescate.
Read More