Severity: High Summary: These vulnerabilities affect: Apple OS X 10.6.x-10.8.x and Safari 6.0.4 and below How an attacker exploits them: Multiple vectors of attack, including enticing your users into opening specially crafted files (often multimedia files), or visiting malicious websites Impact: Various results; in the worst case, an attacker can execute code with your … [Read more...]
Four Office-related Updates Fix Productivity Software Vulnerabilities
Severity: High Summary: These vulnerabilities affect: Microsoft Visio Viewer 2010, SharePoint Server 2010, OneNote 2010, and Outlook for Mac How an attacker exploits them: Multiple vectors of attack, including luring your users into opening malicious Office documents, or into visiting malicious URLs Impact: In the worst case, an attacker can execute code, potentially … [Read more...]
Apple and Facebook Breaches Result in Multi-Platform Java Updates
If you're still using Java, you need to patch it yet again—even if you're using a Mac. Over the last few days both Facebook and Apple have reported network breaches. In both cases, employees at those companies visited a particular web site that was infected with a zero day Java exploit, which then infected the victims with malware. Though Facebook and Apple admit that they … [Read more...]
Apple and Facebook Breaches Result in Multi-Platform Java Updates
If you're still using Java, you need to patch it yet again—even if you're using a Mac. Over the last few days both Facebook and Apple have reported network breaches. In both cases, employees at those companies visited a particular web site that was infected with a zero day Java exploit, which then infected the victims with malware. Though Facebook and Apple admit that they … [Read more...]
Nasty RTFs Nudge Word Into Submission
Severity: High Summary: These vulnerabilities affect: Word (and Office) 2003 through 2010 for Windows (and related components) How an attacker exploits it: By enticing one of your users to open a malicious RTF document Impact: In the worst case, an attacker executes code on your user's computer, gaining complete control of it What to do: Install Microsoft's Word update as … [Read more...]