Month: May 2018

MalwareBytesSecurity

Seven security tips for staying safe on an iPhone

Credit to Author: Thomas Reed| Date: Wed, 16 May 2018 15:00:00 +0000

iPhones have a reputation for being incredibly secure. However, using an iPhone is not an automatic guarantee of invulnerability. These seven tips will help make sure your iPhone is the digital fortress it was meant to be.

Categories:

Tags:

(Read more…)

The post Seven security tips for staying safe on an iPhone appeared first on Malwarebytes Labs.

Read More
ComputerWorldIndependent

Lots of little Microsoft patches, but nothing for this month’s big bugs — and no Previews

Credit to Author: Woody Leonhard| Date: Wed, 16 May 2018 06:32:00 -0700

Third Tuesday of the month and it’s time for bug fixes and Monthly Rollup Previews, right?

Well, no. May’s Third Tuesday brought a big bag of .Net Framework Previews, microcode patches for Win10 1803 and Server 2016, and a Win10 1803 upgrade nag, but no respite at all for the major problems introduced by this month’s earlier patches.

The .Net Framework Previews

Unless you’re testing your own .Net-based software to make sure it won’t explode next month, you don’t need to think about these. There’s the usual assortment of Previews for .Net Framework 2.0, 3.0, 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7 and 4.7.1 for all the usual versions of Windows and Server.

To read this article in full, please click here

Read More
QuickHealSecurity

CVE-2018-4990 – Adobe Reader Double Free (Zero Day) vulnerability alert!

Credit to Author: Prashant Kadam| Date: Wed, 16 May 2018 13:10:48 +0000

The recent zero-day vulnerability CVE-2018-4990 in Adobe Reader enables attackers to perform a Remote Code Execution on targeted machines. Adobe has released a security advisory APSB18-09 on May 14, 2018 to address this issue. According to Adobe, the in-wild attack is targeted and it impacts limited Windows users. Vulnerable versions…

Read More
QuickHealSecurity

Breed of MBR Infecting Ransomware – an analysis by Quick Heal Security Labs

Credit to Author: Preksha Saxena| Date: Wed, 16 May 2018 11:27:25 +0000

Ransomware is becoming one of the most perilous cyberattack methods and also the most habitual techniques for cybercriminals to earn money. It appears to have new weapons in its arsenal over time which is invariably aimed to boost its strength and enhance its business. As encrypting the files and restricting…

Read More

(Insider Story)

Read More