Latest posts

Page 5

UPDATE 2: Microsoft recommends uninstalling problematic updates

Microsoft has reportedly recommended to customers that they uninstall the KB2982791 (MS14-045) update, which is an update that was supposed to fix kernel-mode driver vulnerabilities. It’s also investigating additional problems with three more of the August update.

Continue reading

UPDATE: Patch problems galore – and a community-provided fix

Microsoft update causes problems for users affecting Outlook archived mailboxes and some experiencing blue screens. Community provided fix available.

Continue reading

Top 10 free tools for network monitoring and analysis [Video]

We’ve selected the top ten tools for digital forensic investigation and incorporated them in this short video. Enjoy!

Continue reading

You’ve got (malicious) mail

Unfortunately, email-based malware has gotten much more malevolent over time. And security pros should not see email as “old hat” or an outdated form of attack. Deb Shinder explains why.

Continue reading

August Patch Tuesday roundup

Nine security bulletins were released in August, addressing 37 vulnerabilities, most of them in Windows and a few in server products.

Continue reading

Are vulnerabilities really a risk or simply hype?

Vulnerabilities are the talk of the town lately but you sometimes wonder ‘is there really any substance to these reports, or it is hype?’ With networks running AV and hardened firewalls in place, surely vulnerabilities cannot have that much of an effect… or can they?

Continue reading

Microsoft bumps up security on IE after it earns title of “most exploited browser”

Microsoft is adding a new security feature to Internet Explorer. It’s called Out-of-date ActiveX Control Blocking.

Continue reading

Five great ways to stay in control of a mobile workforce

With mobile working widely expected to continue gaining in popularity, IT departments need to know how to maintain control and security of IT infrastructure. Here are five tips on how to do that.

Continue reading

The case for building a BYOD policy

Whether you’re looking to build a basic BYOD policy or one that’s tailored for your company’s specific needs, the project involves the same steps. Here’s a step-by-step guide.

Continue reading

More bad news for iOS users

At Black Hat USA 2014, researchers presented new ways to “exploit unpatched iOS vulnerabilities for fun and profit”. Deb Shinder tells us more about this in her post.

Continue reading