Apple released a bunch of security fixes for their most popular products yesterday. Learn about them quickly in this video, and then go patch your Macs. (Episode Runtime: 1:26) Direct YouTube Link: https://www.youtube.com/watch?v=foEyHOsLbig EPISODE REFERENCES: Apple’s April Patch Day Summary April OS X updates - Apple April iOS (8.3) update - Apple April Safari … [Read more...]
Printer Doom Hack – WSWiR Episode 122
Apple Patches, Kindle XSS, and Doom Printer Hack If you want to stay current with the Internet "threatscape," our weekly video can help. It summarizes each week's top information and network security news in one convenient place. Subscribe today! Today's episode covers, Apple and Adobe security updates, a cross-site scripting flaw that affects Kindle users, and an interesting … [Read more...]
Blackhat and More – WSWiR Episode 116
Blackhat Summary,Lots of Patches, and MonsterMind Times have changed. Cyber attacks have increased 10-fold, causing a ton of information security (infosec) news each week. Can't keep up with it all? Let me help out. In this weekly video summary, I highlight the biggest information and security news every week. Last week, I had meant to post a Black Hat video summary, but … [Read more...]
Hardware Malware – WSWiR Episode 112
Tons of Patches, Facebook Botnets, and Infected Hand Scanners After a couple weeks of hiatus, we're finally back with our weekly security news summary video. If you want to learn about all the week's important security news from one convenience resource, this is the place to get it. This episode covers the latest popular software security updates from the last two weeks, and … [Read more...]
Time to Polish Your Apple: OS X & Safari Updates
Severity: High Summary: These vulnerabilities affect: Apple OS X 10.6.x-10.8.x and Safari 6.0.4 and below How an attacker exploits them: Multiple vectors of attack, including enticing your users into opening specially crafted files (often multimedia files), or visiting malicious websites Impact: Various results; in the worst case, an attacker can execute code with your … [Read more...]