Technology Made Simple
Monday November 20th 2017

Insider

Archives

‘Security’ Archives

Security Update: Blackberry Enterprise Software

Security Update:  Blackberry Enterprise Software

Blackberry has announced that there is a vulnerability on their Blackberry Enterprise Server product and have released a patch to fix the vulnerability.  RIM (the maker of the blackberry) has released the patch for what they are calling a high risk vulnerability and being that it is being classified as "high risk", it is recommended you get the [...]

Safe Web Browsing Myths

Safe Web Browsing Myths

More often than not, if you are reading articles from this site, you consider yourself a savvy computer user.  Though many of us think that we are using the internet in a safe way, we are actually vulnerable to malware or viruses.  The problem I often run into, is that people think getting infected is about going to seedy internet sites or [...]

Windows Security Best Practices

Windows Security Best Practices

In todays age, you can not be too secure when it comes to your network it's better to be safe than sorry.  In the current economy I've seen many companies consolidate jobs and add new burden to already over-burdened admins.  One of the places where this will hurt companies is the network security departments. I've learned many security faux [...]

Software Update: Adobe Flash and Air Update

Software Update: Adobe Flash and Air Update

    Adobe has released Flash Player 10.1.82.76 to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition. This vulnerability also affects Adobe Air 2.0.2.12310 and earlier versions. Links for More Information: [...]

Browser Update: Google Update Chrome to 5.0.375.126

Browser Update: Google Update Chrome to 5.0.375.126

Google has released Chrome 5.0.375.126 for Linux, Mac, and Windows.  Chrome 5.0.375.126 contains an updated version of the Flash plugin which addresses multiple vulnerabilities. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code.

Software Update: iPhone, iPod Touch and iPad Update

Software Update: iPhone, iPod Touch and iPad Update

Apple has released iOS 4.0.2 for the iPhone and iPod touch and iOS 3.2.2 for the iPad to address vulnerabilities in the FreeType and IOSurface packages. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code or gain system privileges.    This is most likely to address the jailbreakme.com website that was [...]

Effectively Erasing Files

Effectively Erasing Files

Thinking about getting rid of a computer can actually be a lot more complicated that initially thought.  Many people remember to get their files off and delete any important information from the drive and think that's the end of it.  It's not just individuals, companies can also fall into this trap.  Just selecting delete does not mean that the [...]

Browser Update: Google release new Chrome Update

Browser Update: Google release new Chrome Update

Google has released Chrome 5.0.375.125 for Linux, Mac, and Windows to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or obtain sensitive information. Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of the users are up [...]

Browser Update: Mozilla Releases Firefox 3.6.8

Browser Update: Mozilla Releases Firefox 3.6.8

Mozilla has released an updated Firefox browser to make the current version 3.6.7.  This isn’t a big update as if only fixes one flaw: MFSA 2010-48, this update fixed the following problem: Mozilla developer Daniel Holbert reported that the fix to the plugin parameter array crash that was fixed in Firefox 3.6.7 caused a crash showing signs [...]

Software Update: Firefox 3.6.7 and Firefox 3.5.11

Software Update: Firefox 3.6.7 and Firefox 3.5.11

The Mozilla Foundation has released Firefox 3.6.7 and Firefox 3.5.11 for Windows, Mac and Linux to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions, or conduct cross-site scripting attacks. Some of these vulnerabilities also affect [...]

 Page 2 of 6 « 1  2  3  4  5 » ...  Last »