Office for Mac 2011 users warned about SYLK file format

Credit to Author: John E Dunn| Date: Tue, 05 Nov 2019 17:14:21 +0000

Still running Office 2011 on a Mac? If so, there are at least two reasons why that might not be a good idea.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/HjBh551ovHI” height=”1″ width=”1″ alt=””/>

Read more

Facebook launches $2m suit against alleged phishing, hacking sites

Credit to Author: Lisa Vaas| Date: Wed, 30 Oct 2019 11:33:21 +0000

Facebook is using trademark law to target the operators of sites that imitate or target Facebook and Instagram sites.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/g_OViBXsCtw” height=”1″ width=”1″ alt=””/>

Read more

Microsoft Patch Alert: October updates bring problems with Start, RDP, Ethernet, older VB programs

Credit to Author: Woody Leonhard| Date: Tue, 29 Oct 2019 12:18:00 -0700

October started out on an extraordinarily low note. On Oct. 3, Microsoft released an “out of band” security update to protect all Windows users from an Internet Explorer scripting engine bug, CVE-2019-1367, once thought to be an imminent danger to all things (and all versions) Windows.

It was the third attempt to fix that security hole and each of the versions brought its own set of bugs.

To read this article in full, please click here

Read more

Martes de parches de octubre: Microsoft corrige un error crítico de escritorio remoto

Credit to Author: Naked Security| Date: Thu, 10 Oct 2019 11:05:22 +0000

Microsoft corrigió 59 vulnerabilidades en el martes de parches de octubre, incluidas varias vulnerabilidades críticas de ejecución remota de código (RCE). Uno de las más importantes fue una vulnerabilidad (CVE-2019-1333) en el Cliente de Escritorio remoto de la empresa que permitiría que un servidor malicioso obtenga el control de un ordenador Windows que se conecte [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/t9ECCCbOVjE” height=”1″ width=”1″ alt=””/>

Read more

Dispositivos Android afectados por un exploit día cero que Google creía que había parcheado

Credit to Author: Naked Security| Date: Wed, 09 Oct 2019 14:12:59 +0000

Google ha admitido que algunos dispositivos con Android se han vuelto vulnerables recientemente a un grave exploit día cero que la compañía pensó que había reparado definitivamente hace casi dos años. El problema salió a la luz recientemente cuando el Grupo de Análisis de Amenazas (TAG) de Google se enteró de que se estaba utilizando [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/C1QSpGRPTh8″ height=”1″ width=”1″ alt=””/>

Read more

Microsoft fixes drop in number for October, 2019 updates

Credit to Author: SophosLabs Offensive Security| Date: Wed, 09 Oct 2019 20:00:31 +0000

A relatively low number of vulnerabilities were addressed in this month’s Windows update rollups<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/kC7qjGbuUh8″ height=”1″ width=”1″ alt=””/>

Read more

October Patch Tuesday: Microsoft fixes critical remote desktop bug

Credit to Author: Danny Bradbury| Date: Wed, 09 Oct 2019 12:14:46 +0000

Microsoft fixed 59 vulnerabilities in October’s Patch Tuesday, including several critical remote code execution (RCE) flaws.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/jWWY6mMadts” height=”1″ width=”1″ alt=””/>

Read more

Microsoft se apresura a arreglar un día cero de Internet Explorer

Credit to Author: Naked Security| Date: Thu, 26 Sep 2019 13:28:42 +0000

Los usuarios de Windows siempre tuvieron problemas de seguridad con Internet Explorer, y ahora que se ha reemplazado en Windows 10, es como si ahora estuvieran luchando para vivir de manera segura sin él. Por ejemplo, la prisa de esta semana por parte de Microsoft para corregir dos vulnerabilidades de alta prioridad que afectan a [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/TwVohMC2jCk” height=”1″ width=”1″ alt=””/>

Read more

Microsoft releases even more patches for the CVE-2019-1367 IE zero-day, and the bugs are having a field day

Credit to Author: Woody Leonhard| Date: Fri, 04 Oct 2019 06:49:00 -0700

You may recall the Keystone Kops reenactment that goes by the code name CVE-2019-1367. In short:

Sept. 23: Microsoft released the CVE-2019-1367 bulletin, and published Win10 cumulative updates in the Microsoft Catalog for versions 1903, 1809, 1803, 1709, 1703, Server 2019 and Server 2016. It also released an IE rollup for Win7, 8.1, Server 2012 and Server 2012 R2. Those were only available by manual download from the Catalog — they didn’t go out through Windows Update, or through the Update Server. 

Sept. 24: Microsoft released “optional, non-security” cumulative updates for Win10 version 1809, 1803, 1709, 1703, 1607/Server 2016. Nothing for Win10 version 1903. We also got Monthly Rollup Previews for Win7 and 8.1. Microsoft didn’t bother to mention it, but we found that those Previews include the IE zero-day patch as well. This bunch of patches went out through normal channels — Windows Update, Update Server — but they’re “optional” and “Preview,” which means most savvy individuals and companies won’t install them until they’ve been tested.

To read this article in full, please click here

Read more