Simplified Email Encryption, Enhanced Protection from Malware, and Extended Web Security with HTTPS Traffic Scanning October 26, 2011 As part of our ongoing efforts to improve the effectiveness of WatchGuard XCS appliances to protect from data loss, new viruses and malware, and to enhance HTTPS web security, WatchGuard is pleased to announce the availability of XCS 9.2 Update … [Read more...]
Archives for October 2011
Apple Releases a Pile of Security Updates in October
If you use Apple products, you'll be busy updating this month. Today, Apple released a bunch of security advisories (on their Security Update page), informing customers of updates for many of their products. Here's a list of security advisories for all the updated products: OS X Lion v10.7.2 and Security Update 2011-006 iTunes 10.5 Safari 5.1.1 iOS 5 Software … [Read more...]
Patch Day Followup: Host Integration Server and Forefront UAG Updates
As you probably noticed, yesterday was Microsoft's Patch Day. Hopefully, you saw our alerts for the most important October security bulletins, and have already gotten a start patching them. If not, you can find our Internet Explorer and consolidated Windows alerts here: Five Windows Bulletins, One Critical Critical IE Cumulative Patch Closes Eight Code … [Read more...]
Five Windows Bulletins, One Critical
Bulletins Affect .NET Framework, Media Center, Kernel-mode Drivers, and More Severity: High Summary: These vulnerabilities affect: All current versions of Windows and components that ship with it How an attacker exploits them: Multiple vectors of attack including enticing your users to malicious web sites, or into opening booby-trapped files Impact: Various results; in the … [Read more...]
Critical IE Cumulative Patch Closes Eight Code Execution Flaws
Severity: High 11 October, 2011 Summary: This vulnerability affects: All current versions of Internet Explorer (including IE9) How an attacker exploits it: By enticing one of your users to visit a malicious web page, or click a malicious link Impact: In the worst case an attacker can execute code on your user's computer, gaining control of it What to do: Deploy the … [Read more...]