I missed yesterday's daily video due to an offsite meeting, so today's episode contains two important stories; an emergency update to fix a zero day vulnerability in Internet Explorer (IE) and the latest update to the Ashley Madison breach. If you run a Microsoft network, or you know anyone that had an account on Ashley Madison, you'll want to watch the video below to learn … [Read more...]
Rowhammer Pwns DRAM – Daily Security Byte EP.42
The new Rowhammer attack exploits the physics of electricity on DRAM chips to gain root control of computers. Want to learn more? Watch the video or check out the references below. (Episode Runtime: 2:31) Direct YouTube Link: https://www.youtube.com/watch?v=SKycd-eE8Js EPISODE REFERENCES: Google researchers' blog disclosure about Rowhammer - Google Project Zero Easy to … [Read more...]
Mega IE Update Corrects 37 Vulnerabilities; Including Zero Day
Summary: These vulnerabilities affect: All current versions of Internet Explorer How an attacker exploits it: By enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet Explorer … [Read more...]
Latest IE Patch Corrects 26 Vulnerabilities
Summary: These vulnerabilities affect: All current versions of Internet Explorer How an attacker exploits it: By enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet Explorer … [Read more...]
IE Update Fixes Remote Code Execution and Certificate Issues
Summary: This vulnerability affects: All current versions of Internet Explorer How an attacker exploits it: Mostly by enticing one of your users to visit a web page containing malicious content Impact: Various, in the worst case an attacker can execute code on your user's computer, potentially gaining complete control of it What to do: Deploy the appropriate Internet … [Read more...]