Credit to Author: Marc Ferranti| Date: Wed, 26 Dec 2018 03:00:00 -0800
Credit to Author: Andrew Brandt| Date: Fri, 14 Dec 2018 09:00:43 +0000
Don’t give your computers a year-end holiday from regular updates this month<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/_muCl0RYPfk” height=”1″ width=”1″ alt=””/>Read more
Credit to Author: Woody Leonhard| Date: Fri, 21 Dec 2018 08:21:00 -0800
Just when you’re ready to settle in for some egg and nog and whatever may accompany, Windows starts throwing poison frog darts. This month, a fairly boring patching regiment has turned topsy turvey with an unexplained emergency patch for Internet Explorer (you know, the browser nobody uses), combined with an Outlook 2013 patch that doesn’t pass the smell test.
Mysterious bug fix for IE
Microsoft set off the shower of firecrackers on Dec. 19 when it released a bevy of patches for Internet Explorer:
Win10 1809– KB 4483235 – build 17763.195
Credit to Author: Gregg Keizer| Date: Wed, 19 Dec 2018 17:26:00 -0800
Microsoft rarely mentions Internet Explorer (IE) anymore, but when it does, it usually means bad news.
So it was Wednesday, when Microsoft issued a rare emergency security update to plug a critical vulnerability in the still-supported IE9, IE10 and IE11. The flaw was reported to Microsoft by Google security engineer Clement Lecigne.
According to Microsoft, attackers are already exploiting the vulnerability, making it a classic “zero-day” bug. Because of that, the company released a fix before the next round of security updates scheduled for Jan. 8.
Credit to Author: Nikolay Pankov| Date: Thu, 13 Dec 2018 16:20:04 +0000
Thanks to our proactive technologies, zero-day vulnerability CVE-2018-8611 was neutralized.Read more
Credit to Author: Sophos Italia| Date: Mon, 26 Nov 2018 06:26:52 +0000
Una nuova ricerca mette in evidenza le vulnerabilità dei bancomat<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/VpPDL9xMt_o” height=”1″ width=”1″ alt=””/>Read more
Credit to Author: Woody Leonhard| Date: Thu, 29 Nov 2018 08:30:00 -0800
By far the most important reason for this month’s relative patching calm: Microsoft decided to wait and get the Windows 10 (version 1809) patch right instead of throwing offal against a wall and seeing what sticks.
What remains is a hodge-podge of Windows patches, some mis-identified .NET patches, a new Servicing Stack Update slowly taking form, a bunch of Office fixes – including two buggy patches that have been pulled and one that’s been fixed – the usual array of Flash excuses and Preview patches.
Credit to Author: Woody Leonhard| Date: Mon, 19 Nov 2018 08:15:00 -0800
Two related Office 2010 non-security patches issued on Nov. 6 were pulled on Nov. 17. KB 4461522 and KB 2863821 are both related to changes coming in the Japanese calendar next month attributed to the abdication of Emperor Akihito in favor of his son, Naruhito. The event has been compared to the Y2K problem in the west. It’s not clear why two patches were released on Nov. 6 to accommodate that calendar change, but both KB articles now sport the admonition:
Credit to Author: Gregg Keizer| Date: Fri, 16 Nov 2018 02:59:00 -0800
A Windows expert this week urged Microsoft to put its money where its mouth is and produce a status dashboard or website that reports and tracks problems with the operating system.
Coincidentally or not, on Wednesday Microsoft said it would launch a “Windows update status dashboard,” but did not name a timetable except for a broad “in the coming year.”
“I can go to this page and see if something happening with Office 365 is just a me thing or if everyone else is seeing the same,” said Susan Bradley in a Nov. 13 email reply to questions, referring to the Office 365 Admin Center. (Note: Only those with administrative credentials have access; it’s not meant to provide information to end users.) “(But) if I want to find out if something is a known issue with Windows 10, I have to dig through – and monitor for changes – these pages,” she continued, listing two separate support documents for one such known issue.
Credit to Author: Nikolay Pankov| Date: Wed, 14 Nov 2018 09:04:53 +0000
Our exploit prevention technologies detected another zero-day exploit for WindowsRead more
Credit to Author: Woody Leonhard| Date: Wed, 07 Nov 2018 16:08:00 -0800
Yesterday, Microsoft released ADV180028, Guidance for configuring BitLocker to enforce software encryption, in response to a clever crack published on Monday by Carlo Meijer and Bernard van Gastel at Radboud University in the Netherlands (PDF).