Microsoft's Background Intelligent Transfer Service helps Windows and other programs quietly deliver updates in the background, without taxing your network bandwidth. Unfortunately, cyber criminals have also figured out how to exploit it to continually reinstall malware on a cleaned computer. Watch the video below to learn more. (Episode Runtime: 4:08) Direct YouTube … [Read more...]
May Day, May Day, Patch Day – Daily Security Byte EP. 261
Do you want to stay safe online? Then you need to keep your patches up-to-date since most Internet exploits target old flaws. Tuesday's Byte video covers Microsoft and Adobe's security bulletins for May. Watch below, but more importantly, go update. (Episode Runtime: 2:38) Direct YouTube Link: https://www.youtube.com/watch?v=tbmSGgL3TzY EPISODE REFERENCES: Summary of … [Read more...]
Remove QuickTime for Windows – Daily Security Byte EP. 248
Trend Micro researchers found two serious vulnerabilities in Quicktime for Windows. Normally I'd tell you to patch, but instead I'm suggestion you remove. Watch today's video to find out why. (Episode Runtime: 1:36) Direct YouTube Link: https://www.youtube.com/watch?v=9JmCwViLPuM EPISODE REFERENCES: Trend Micro find two remote code execution flaws in Quictime for Windows … [Read more...]
April Patch Day 2016 – Daily Security Byte EP. 247
Microsoft and Adobe have delivered a fresh batch of security updates for April. If you use products from either vendor, watch today's short Security Byte to get a summary of the updates, and more importantly, follow the links below to get your patches. (Episode Runtime: 2:00) Direct YouTube Link: https://www.youtube.com/watch?v=r95SPareQU4 EPISODE REFERENCES: Microsoft … [Read more...]
Badlock – Daily Security Byte EP. 242
Last week, a researcher mysteriously warned the world about an upcoming critical SMB flaw, without sharing any technical details. The warning says the flaw is bad enough that network administrators will want to prepare for it, so they know what to patch immediately. Watch below to learn what little we know about this flaw, and how the security community has reacted to the early … [Read more...]