A few months ago, some of Lenovo's preinstalled adware got them into security hot water. Looks like their pre-installed software has struck again. Watch today's video to learn about the latest Lenovo vulnerabilities and what you can do about them. (Episode Runtime: 1:54) Direct YouTube Link: https://www.youtube.com/watch?v=2jU2b42iVY4 EPISODE REFERENCES: Security advisory … [Read more...]
Windows 8.x and Server 2012 Suffer From Local EoP Vulnerability
Severity: Medium Summary: These vulnerabilities affect: Windows 8.x, Server 2012, and RT How an attacker exploits it: By running a specially crafted application Impact: A local low privileged attacker can gain SYSTEM privileges on your Windows computers What to do: Deploy the appropriate update at your convenience, or let Windows Automatic Update do it for … [Read more...]
Quintuple of Windows Updates Patch Zero Day Flaw and More
Severity: High Summary: These vulnerabilities affect: All current versions of Windows How an attacker exploits them: Multiple vectors of attack, including luring users to malicious web sites or into viewing malicious images Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate Microsoft patches as soon … [Read more...]
One of Windows' Five Updates Fixes a Zero Day Flaw
Severity: High Summary: These vulnerabilities affect: All current versions of Windows How an attacker exploits them: Multiple vectors of attack, including luring users to malicious web sites or into opening malicious files Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate Microsoft patches as soon … [Read more...]
Windows Patches Fix Kernel-Mode Drivers, .NET, Silverlight, and More
Severity: High Summary: These vulnerabilities affect: All current versions of Windows, including related components like the .NET Framework and Silverlight How an attacker exploits them: Multiple vectors of attack, including luring users to malicious web sites, or into running specially crafted programs Impact: In the worst case, an attacker can gain complete control of … [Read more...]