Security

SecurityTrendMicro

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 19, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 23 Feb 2018 15:44:45 +0000

Earlier this week, Trend Micro released its Security Roundup for 2017, which reveals an increase in ransomware, cryptocurrency mining and business email compromise (BEC) attempts over the past year as cybercriminals refined and targeted their attacks for greater financial return. Surprisingly, some of the biggest attacks still rely on known vulnerabilities that have available patches….

Read More
ComputerWorldIndependent

New non-security patches arrive for Win10 1607 and 1703; 1709 update likely soon

Credit to Author: Woody Leonhard| Date: Fri, 23 Feb 2018 04:26:00 -0800

Microsoft last night released a flood of unexpected patches. Yes, that’s a Thursday night dump. No, there weren’t any pressing security fixes – at least, none that were advertised. I have no idea why Microsoft’s pushing this offal out the Automatic Update chute.

In addition to a scattering of Preview patches for Win7, 8.1 and Server 2002 – which are usually posted on the third “Week C” Tuesday of the month – and the Surface Pro 3 firmware patch that was announced, but not delivered, Wednesday, we have two new cumulative updates: one for Win10 Anniversary Update (version 1607) and one for Win10 Creators Update (version 1703). Susan Bradley has a full list with links on the AskWoody site.

To read this article in full, please click here

Read More
ComputerWorldIndependent

Clever, redefined

Credit to Author: Sharky| Date: Fri, 23 Feb 2018 03:00:00 -0800

It’s the 1990s, and this pilot fish is hired at a big international company to maintain a group of Linux servers — and they definitely need help.

“My initial survey of the systems uncovered some serious security problems,” says fish. “Everything had been set up and users added with no regard to security.

“As a temporary holding action, I set all the users’ login shells to a custom restricted shell that allowed each user access to only the directories and commands necessary for their work while I analyzed all the systems, planned a decent security configuration for each, got approvals, did testing and, finally, implemented the new security.”

To read this article in full, please click here

Read More