Government Cyber Privacy Policy, Web Breaches, RSA Key Flaw Updates, and More Are you sick of Anonymous-related news? Well, I am. In this week's WatchGuard Security Week in Review, I purposely ignore Anonymous stories to talk about other security news. If you are interested in new government cyber policies, major web breaches, or FBI controlled malware networks, watch this … [Read more...]
Archives for February 2012
WatchGuard Security Week in Review: Episode 5
Lots of Patches, Big Nortel Breach, and More Anonymous Shenanigans Are you ready for another week of software updates, Enterprise breaches, and hacktivist cyber-riots? If so, this week's episode of WatchGuard Security Week in Review is hot off the NLE system. Watch it below, and tell us what you think in the comments section. As usual, if you'd rather read then look at my ugly … [Read more...]
Adobe Flash Update Plugs Zero Day XSS Hole and Others
Summary: This vulnerability affects: Adobe Flash Player 11.1.102.55 and earlier, running on all platforms. This also affects the Android version of Flash. How an attacker exploits it: By enticing your users to visit a website containing malicious Flash content Impact: In the worst case, an attacker can execute code on your computer, potentially gaining control of it What … [Read more...]
Grab Adobe's Shockwave Update to Avoid Web-based Attacks
Summary: This vulnerability affects: Adobe Shockwave Player 11.6.3.633 and earlier, running on Windows and Macintosh computers How an attacker exploits it: By enticing your users into visiting a website containing a malicious Shockwave content Impact: An attacker can execute code on your computer, potentially gaining control of it What to do: If you allow the use of … [Read more...]
Oracle Shores Up 14 Major Java Vulnerabilities
Severity: High Summary: These vulnerabilities affect: All versions of Sun Java Runtime Environment (JRE) and Java Development Kit (JDK) released before today How an attacker exploits them: Typically by luring your users to a malicious web page containing specially crafted Java Impact: Various results; in the worst case, an attacker can gain complete control of your … [Read more...]