Month: November 2017

ComputerWorldIndependent

Microsoft Patch Alert: November’s forced upgrades, broken printers and more

Credit to Author: Woody Leonhard| Date: Tue, 28 Nov 2017 13:08:00 -0800

There are so many issues with this month’s security patches that it’s hard to decide where to begin. Let’s start with the problems that have been acknowledged, then move into the realm of what’s not yet fully defined.

Forced upgrades

Many users have remarked about how much the forced 1703-to-1709 Windows 10 upgrades feel like Microsoft’s detested forced upgrades from Win 7 and 8.1 to 10 – the “Get Windows X” campaign. Although the situation’s different on the surface, the net result is the same. Many people who were happily using Windows 10 Fall Update – version 1703 – were forcibly upgraded this month to the Fall Creators Update – version 1709 – even on systems that were not supposed to be upgraded.

To read this article in full, please click here

Read More
IndependentSecuriteam

SSD Advisory – ZTE ZXDSL Configuration Reset

Credit to Author: SSD / Maor Schwartz| Date: Tue, 28 Nov 2017 13:18:47 +0000

Vulnerability Summary The following advisory describes a configuration reset vulnerability found in ZTE ZXDSL 831CII version 6.2. ZXDSL 831CII is “an ADSL access device to support multiple line modes. It supports ADSL2/ADSL2+ and is backward compatible to ADSL, even offers auto-negotiation capability for different flavors (G.dmt, T1.413 Issue 2) according to central office DSLAM’s settings … Continue reading SSD Advisory – ZTE ZXDSL Configuration Reset

Read More
SecurityTrendMicro

Our Exposed World – Exposed Cities in Europe

Credit to Author: Natasha Hellberg (Senior Threat Researcher)| Date: Tue, 28 Nov 2017 20:11:58 +0000

Today Trend Micro’s FTR team released more papers on our our continued investigation into our exposed world. Already having looked at the Exposed US, we now turn our attention to Europe, looking not only at Western European capitals, but deeper into three of its largest countries – Germany, France, and the United Kingdom. Once again…

Read More
ScadaICSSchneider

Proceed with Caution: How to Safely Recover a Building from a Power Outage

Credit to Author: Patrick Bois| Date: Tue, 28 Nov 2017 20:35:37 +0000

Extreme weather appears to be all too common of late, with multiple devastating hurricanes and major storms hitting the Caribbean, southeastern U.S. and even Ireland over the last couple of… Read more »

The post Proceed with Caution: How to Safely Recover a Building from a Power Outage appeared first on Schneider Electric Blog.

Read More
MalwareBytesSecurity

Please don’t buy this: identity theft protection services

Credit to Author: William Tsing| Date: Tue, 28 Nov 2017 17:31:58 +0000

Identity theft protection services promise to have your back against cybercriminals looking to steal your data. But they don’t actually stop them from taking your identity. Are they worth it, then? We say no.

Categories:

Tags:

(Read more…)

The post Please don’t buy this: identity theft protection services appeared first on Malwarebytes Labs.

Read More
ScadaICSSchneider

Equipping Tomorrow’s Healthcare Facilities for the Digital Age

Credit to Author: Mohamed Shishani| Date: Tue, 28 Nov 2017 14:00:11 +0000

The main mission of any healthcare facility is to provide cost-effective care, patient satisfaction and safety, and financial performance. However, according to a recent survey commissioned by Schneider Electric, many… Read more »

The post Equipping Tomorrow’s Healthcare Facilities for the Digital Age appeared first on Schneider Electric Blog.

Read More
FortinetSecurity

Fortinet Quarterly Threat Landscape Report: The Battle Against Cybercrime Continues to Escalate

Credit to Author: Anthony Giandomenico| Date: Tue, 28 Nov 2017 13:30:59 +0000

Fortinet today announced the findings of its latest Global Threat Landscape Report. The research reveals that high botnet reoccurrence rates and an increase of automated malware demonstrate that cybercriminals are leveraging common exploits combined with automated attack methods at unprecedented speed and scale.

Read More