Thursday, February 20th, 2014
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.
In its 2013 Microsoft Vulnerabilities Study, Avecto found that you could ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, February 20th, 2014
Adobe has released security updates to address a vulnerability in Adobe Flash Player 12.0.0.44 or earlier versions for Windows and Macintosh and Adobe Flash Player 11.2.202.336 or earlier versions for Linux. Exploitation of this vulnerability could allow an attacker to take control of an affected system.
US-CERT recommends that users and administrators review ...
Posted in Internet, Linux, Security, Software, Windows | No Comments
Monday, February 17th, 2014
Evernote users are being actively targeted with an email spam campaign that tries to trick them into following a malicious link.
Sent from
[email protected] and titled "Image has been sent", the email pretends to be a notification from Evernote that alerts the user to an image he or she needs to check out, ...
Posted in Internet, Security | No Comments
Monday, February 17th, 2014
Technical details about a vulnerability in Linksys routers that's being exploited by a new worm have been released Sunday along with a proof-of-concept exploit and a larger than earlier expected list of potentially vulnerable device models.
Last week, security researchers from the SANS Institute's Internet Storm Center identified a self-replicating malware ...
Posted in Hardware, Internet, Networking, Security | No Comments
Tuesday, February 11th, 2014
Private profiles of Instagram users could be made public as a result of a vulnerability that took almost six months to fix.
The flaw would have enabled hackers to change privacy settings within user profiles to expose potentially sensitive photos to the internet, or to lock down popular pages by marking ...
Posted in Coding, Internet, Privacy, Security | No Comments