It happens every month... Microsoft released their June patches on Tuesday, fixing 45 vulnerabilities in a range of popular products. If you manage a Windows network, you should watch this video to get the Patch Day highlights, and to learn which products to update first. As an aside, I recorded this video Wednesday, but was not able to edit and post it until today due to … [Read more...]
Windows Updates for Media Center, .NET, and LRPC
Severity: Medium Summary: These vulnerabilities affect: All current versions of Windows (and related components like .NET Framework) How an attacker exploits them: Multiple vectors of attack, such as enticing you into opening maliciously crafted Office file. Impact: In the worst case, an remote attacker can gain complete control of your Windows computer What to do: Install … [Read more...]
Windows Updates Mend Critical Journal Vulnerability & More
Severity: High Summary: These vulnerabilities affect: All current versions of Windows (and related components like XML Core Services) How an attacker exploits them: Multiple vectors of attack, including enticing you to malicious web sites, or into interacting with malicious documents or images. Impact: In the worst case, an attacker can gain complete control of your Windows … [Read more...]
Windows Updates Fix GDI+, RDP, and TCP Vulnerabilities
Severity: High Summary: These vulnerabilities affect: All current versions of Windows (and related components like XML Core Services) How an attacker exploits them: Multiple vectors of attack, including enticing you to malicious web sites, or into interacting with malicious documents or images. Impact: In the worst case, an attacker can gain complete control of your Windows … [Read more...]
Four Windows Bulletins Fix Group Policy, .NET, and iSCSI Flaws
Severity: Medium Summary: These vulnerabilities affect: All current versions of Windows (and related components like .NET Framework) How an attacker exploits them: Multiple vectors of attack, though most require authenticated attackers to do things locally Impact: In the worst case, an authenticated attacker can gain complete control of your Windows computer What to do: … [Read more...]