Month: February 2018

ComputerWorldIndependent

Microsoft Patch Alert: February's fixes aren’t as bad as last month, but problems abound

Credit to Author: Woody Leonhard| Date: Mon, 26 Feb 2018 09:34:00 -0800

The January 2018 Microsoft patching cycle may have been the worst and most invasive set of Microsoft releases in recent memory. The February updates, by marked contrast, only clobber a limited number of machines. How many? We don’t know — and Microsoft isn’t saying.

Bad Win10 Fall Creators Update patch

What we do know for sure is that the buggy Win10 Fall Creators Update cumulative update KB 4074588 tossed many PCs into bluescreen hell and disabled USB devices of various stripes. That’s quite an accomplishment for version 1709 which, according to AdDuplex, is now said to run on 85% of all Windows 10 machines. To look at it a different way, Microsoft blew the cumulative update to the most-used version (1709) of the most-used Windows (Win10 now surpasses Win7).

To read this article in full, please click here

Read More
MalwareBytesSecurity

A week in security (February 19 – February 25)

Credit to Author: Malwarebytes Labs| Date: Mon, 26 Feb 2018 17:36:02 +0000

A roundup of notable news stories from February 19–25, including drive-by download attacks on Chinese websites, Deepfakes programs being paired with cryptominers, and a review of GDPR guidelines.

Categories:

Tags:

(Read more…)

The post A week in security (February 19 – February 25) appeared first on Malwarebytes Labs.

Read More
MicrosoftSecurity

Best practices for securely moving workloads to Microsoft Azure

Credit to Author: Jenny Erie| Date: Mon, 26 Feb 2018 17:00:04 +0000

Azure is Microsofts cloud computing environment. It offers customers three primary service delivery models including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Adopting cloud technologies requires a shared responsibility model for security, with Microsoft responsible for certain controls and the customer others, depending on the service

Read more

Read More
MalwareBytesSecurity

The state of malicious cryptomining

Credit to Author: Jérôme Segura| Date: Mon, 26 Feb 2018 16:08:03 +0000

From malware coin miners to drive-by mining, we review the state of malicious cryptomining in the past few months by looking at the most notable incidents and our own telemetry stats.

Categories:

Tags:

(Read more…)

The post The state of malicious cryptomining appeared first on Malwarebytes Labs.

Read More
SecurityTrendMicro

VPN 101 – Part 1: What You Need to Know to Stay Safe and Protect Your Privacy Online

Credit to Author: Michael Miley| Date: Mon, 26 Feb 2018 14:00:01 +0000

WikiLeaks has published more than 80 strains of malware.The Internet is a wonderful thing. But we all know there are also risks lurking around every corner. We want to protect ourselves from malware and identity theft, prevent third-party trackers and advertisers slurping our private information, and keep our kids safe when browsing. One way to do this is to use a virtual private…

Read More