Month: January 2018

ComputerWorldIndependent

Microsoft's mystifying Meltdown/Spectre patches for AMD processors

Credit to Author: Woody Leonhard| Date: Tue, 16 Jan 2018 07:33:00 -0800

I’ve seen a lot of bizarre Microsoft patches-of-patches, but the new patches for AMD processors are in a world of their own. The security-only, manually downloadable patches appear to be Meltdown/Spectre patches for machines that were bricked by other bad patches, earlier this month, but they’ve arrived with no instructions — and a strange circular logic.

Last week, Microsoft released two patches, with these official titles:

  • KB 4073578: Unbootable state for AMD devices in Windows 7 SP1 and Windows Server 2008 R2 SP1
  • KB 4073576: Unbootable state for AMD devices in Windows 8.1 and Windows Server 2012 R2

The Win7 KB article says:

To read this article in full, please click here

Read More
FortinetSecurity

Fortinet Certified by ICSA for Advanced Threat Defense

Credit to Author: David Finger| Date: Tue, 16 Jan 2018 13:45:59 +0000

The challenge is that most all email security vendors say the same thing: “99.9% catch rate, no false positives, easy to manage” and so forth, which is why Fortinet is firmly committed to regular participation in independent testing. Consider, for example, the Advanced Threat Defense certification testing conducted by ICSA Labs.

Read More
ComputerWorldIndependent

How to make sure Windows gets the right patches coming to it

Credit to Author: Gregg Keizer| Date: Tue, 16 Jan 2018 03:12:00 -0800

The Windows emergency security updates issued by Microsoft earlier this month came with an unprecedented prerequisite – a new key stored in the operating system’s registry – that antivirus vendors were told to generate after they’d guaranteed their code wouldn’t trigger dreaded Blue Screens of Death (BSoD) when users apply the patches.

The demands confused customers, and fueled a flood of support documents and an avalanche of web content. Those who heard about the Meltdown and Spectre vulnerabilities struggled to figure out whether their PCs were protected, and if not, why not. Millions more, not having gotten wind of the potential threat, carried on without realizing that their PCs might be barred from receiving several months’ worth of security updates.

To read this article in full, please click here

Read More
QuickHealSecurity

Quick Heal thwarts attempts of a JAVA jRAT phishing campaign targeting an international embassy in India

Credit to Author: Pradeep Kulkarni| Date: Tue, 16 Jan 2018 05:09:15 +0000

Earlier we had blogged about how JAVA based jRAT malware were evolved in the recent times. At Quick Heal Security Labs, we are actively observing jRAT campaigns happening in the wild. These JAVA malware spread through phishing campaigns. While analyzing one such phishing campaign, we found that an International embassy in India was being targeted by phishers. The malware used in the phishing campaign was the infamous JAVA malware called jRAT. …

Read More