Blog Posts - Security Update



QuadRooter le vulnerabilità che colpiscono più di 900 milioni dispositivi Android

Check Point, azienda israeliana specializzata in prodotti relativi alla sicurezza, è venuta a conoscenza di quattro nuove vulnerabilità Android. In occasione della Def Con 24, una tra le più importanti conferenze sulla sicurezza informatica, tenut...
by MondoUnix on Aug 9, 2016

Google Rilis Update untuk Memperbaiki Performa LG Nexus 5x

Seperti sudah diberitahukan sebelum-sebelumnya kalau Google berjanji akan rutin memberikan Security Update untuk perangkat Smartphonenya. Security Update ini akan hadir setiap bulan dan biasanya di rilis pada awal bulan. Nah Hari ini Google telah mer...

Linux Distros Don't Keep Up with WebKit Updates

Major desktop browsers push automatic security updates directly to users on a regular basis, so most users don't have to worry about security updates. But L…...
by Awesome Tech News on Feb 10, 2016

More ransomware shenanigans

Recently, an update of the infamous CryptoWall ransomware (or cryptoware) was released - you can read more about that particular ransomwere here: CryptoWall 4.0 released with new Features such as Encrypted File Names Additionally, another ransomware...
by MondoUnix on Nov 15, 2015

Linux Crypto Ransomware Issue Hits 40,000 Sites

RUSSIAN ANTIVIRUS OUTFIT Dr Web has carried on studying the Linux.Encoder.1 trojan threat and reported some more bad news about increased infection. The firm revealed the problem already, but now it has more information. While before we spoke of infe...
by MondoUnix on Nov 14, 2015

Google reveals Samsung Galaxy S6 Edge’s security flaws

Google has highlighted 11 security flaws in Samsung's flagship Android handset, the Galaxy S6 Edge. The vulnerabilities include a loophole that could have been used by hackers to gain control of a victim's phone. Most of the issues were fixed after G...
by MondoUnix on Nov 6, 2015

The first rule of zero-days is no one talks about zero-days

How do you defend yourself against the unknown? That is crux of the zero-day vulnerability: a software vulnerability that, by definition, is unknown by the user of the software and often its developer as well. Everything about the zero-day market, fr...
by MondoUnix on Oct 21, 2015

Pawn Storm attack: Flash zero-day exploit hits diplomatic inboxes

Hackers behind a long-running cyber-espionage campaign have begun using a new Adobe Flash zero-day exploit in their latest campaign. The attackers behind Pawn Storm targeted several foreign affairs ministries from around the globe using a Flash-based...
by MondoUnix on Oct 16, 2015

Security bugs in global mobile networks exposed

Mobile networks around the world have been penetrated by criminals and governments via bugs in the code that keeps them running, research suggests. The bugs could be abused to carry out large scale fraud and unlawful surveillance, security company Ad...
by MondoUnix on Oct 16, 2015

North Korea exploits 0-day in Seoul’s favourite word processor

FireEye researchers Genwei Jiang and Josiah Kimble say attackers from North Korea exploited a zero day vulnerability in a word processor popular with the South Korea's government. The attackers went after the vulnerability (CVE-2015-6585) in the Hang...
by MondoUnix on Sep 11, 2015

Hackers spread malware via Yahoo ads

Hackers who previously exploited vulnerabilities in Adobe Flash have now used advertising on Yahoo's largest websites to distribute malware to billions, according to researchers at Malwarebytes. The technique, growing at an alarming rate, is facilita...
by MondoUnix on Sep 8, 2015

Mobile device screens recorded using the Certifi-gate vulnerability

Vulnerable plug-ins have been installed on hundreds of thousands of Android devices, allowing screens to be recorded, according to data from the scanning tool which discovered that the so-called Certifi-gate vulnerability is already being exploited i...
by MondoUnix on Aug 26, 2015

Hammertoss, il virus creato in Russia che arriva con una foto su Twitter

Il malware è stato creato dal gruppo di hacker APT29. I pirati sono riusciti a dare istruzioni ad account monitorati al fine di inviare informazioni segrete. Tra gli obiettivi quello di comunicare senza che nessuno se ne possa accorgere attraverso l...
by MondoUnix on Aug 24, 2015

Zero-day flaw found in Mac OS X Yosemite security update

An Italian teenager has discovered a previously unknown zero-day vulnerability in Apple's Mac OS X platform that could be exploited by hackers to allow privileged access to Mac systems. A proof-of-concept has been released by Luca Todesco, 18, who sa...
by MondoUnix on Aug 20, 2015

December 2014 Updates

Today, as part of Update Tuesday, we released seven security updates – three rated Critical and four rated Important in severity, to address 24 unique Common Vulnerabilities and Exposures (CVEs) in Microsoft Windows, Internet Explorer (IE), Off...
by The WSUS Support Team blog on Dec 9, 2014

Microsoft launches security updates

Microsoft launches security updates Microsoft’s November Patch Tuesday launch consists of fourteen patches, 4 of them important, dealing with 33 susceptibilities, for all supported variations of Windows desktop and also server, as well as Inter...

September 2014 Security Bulletin Release Webcast and Q&A

Today we’re publishing the September 2014 Security Bulletin Webcast Questions & Answers page . We fielded four questions on various topics during the webcast, with specific bulletin questions focusing primarily on Internet Explorer (MS14-05...
by The WSUS Support Team blog on Sep 12, 2014

The September 2014 Security Updates

Today, as a part of our regular Update Tuesday process, we released four security bulletins – one rated Critical and three rated Important in severity – to address 42 Common Vulnerabilities & Exposures (CVEs) in Microsoft Windows, Int...
by The WSUS Support Team blog on Sep 9, 2014

August 2014 Security Updates

Today, as part of Update Tuesday, we released nine security updates – two rated Critical and seven rated Important – to address 37 Common Vulnerabilities & Exposures (CVEs) in SQL Server, OneNote, SharePoint, .NET, Windows and Interne...
by The WSUS Support Team blog on Aug 12, 2014

Theoretical Thinking and the June 2014 Bulletin Release

As security professionals, we are trained to think in worst-case scenarios. We run through the land of the theoretical, chasing “what if” scenarios as though they are lightning bugs to be gathered and stashed in a glass jar. Most of time,...
by The WSUS Support Team blog on Jun 10, 2014


Trending Topics

Close