Posts Tagged ‘Software Security’

Patch Windows

Microsoft prepares 14 patches for the next Tuesday

Over this week Microsoft issued their monthly advance notification of security bulletins. The next update will contain 14 security patches to fix critical vulnerabilities in Microsoft Office, Internet Explorer and Microsoft Windows SharePoint. This month we have 8 security update with remote code execution impact while there are 2 that allow attacker to conduct a [...]

Share

BSOD after Windows patch Tuesday

Microsoft alerted about an issue in the security update detected after installing KB2823324, the bulletin MS13-036 comes to fix several  vulnerabilities but after installing the patch some users were not able to normally boot the operating system. According to Microsoft blog post: “We are aware that some of our customers may be experiencing difficulties after [...]

Share
Vulnerability

Patch as Patch Can: All Software is Flawed

By Michelle Drolet It may not be glamorous, but a meticulous patching program is necessary to prevent server and client-side exploits.  HP’s DVLabs and other research based on Open Source Vulnerability Database (OSDV) data  found that several  of today’s successful “Top Ten” vulnerabilities were discovered (and patches were released for them) in the mid-2000s.  Yet [...]

Share

Try App Whitelisting to Mitigate Malware

By Paul Paget There will always be a threat from malware – malicious software that is designed to steal or corrupt data on computers. Malware affects everyone from security services to silver surfers, and when it isn’t checked it can wreak havoc. Ultimately, it doesn’t matter what size your business is, whether you’re a multinational [...]

Share
person-computer

CoreTrace BOUNCER Advanced Endpoint security Product

New video demonstration have been released by CoreTrace about how to stop Reflective Memory Injection attack that provide attacker a full control on victim machine, Tools used in the demo is Metasploit on attacker side machine and windows XP operating system on victim computer. As always technique used to execute the malicious script on victim [...]

Share

Security issues in online games

Article By Tom Green Game development often utilizes the cutting edge technology in computer graphics, artificial intelligence, human computer interaction and programming. Game providers do not pay much attention to security techniques. The traditional target of computer games security was mainly copy protection, however in modern games the focus should also be discourage cheating to [...]

Share

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Monthly Report

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) released their monthly monitor report in collaboration with US-CERT, the report focus to assist the community with ways to secure and protect their environment. If we look at the report it is stated the increase of highly sophisticated malwares that are targeting different operating and industrial [...]

Share