Vulnerabilty in BASH being actively exploited on Unix systems

During the afternoon on September 24, an actively exploited BASH vulnerability was identified on Unix systems.  The following systems have been identified as vulnerable. RedHat Enterprise Linux (version 4-7) – bash is the default shell for RedHat enterprise systems CentOS – versions 5-7 – http://lists.centos.org/pipermail/centos/2014-September/146099.html Ubuntu – versions 10.04LTS, 12.04LTS, and 14.04LTS – http://www.ubuntu.com/usn/usn-2362-1/ Debian […]

Two factor authentication available for iCloud backups

As of Tuesday, September 16, Apple has enabled two factor authentication for iCloud backups. Additional information is available at http://arstechnica.com/security/2014/09/apples-two-factor-authentication-now-protects-icloud-backups/

Advance notice of Microsoft patches scheduled to be released on Sept 9

Microsoft has just provided advance notice of the patches that are scheduled to be released on Tuesday, September 9. There details as currently known, are available at https://technet.microsoft.com/library/security/ms14-sep There are a total of four patches scheduled to be released. One of the patches is classified as CRITICAL (for Windows Workstations) and the remaining three are […]

Advance notice of August Microsoft patches – to be released on August 12

Microsoft just provided advance notice of the patches that are scheduled to be released on Tuesday, August 12. There are a total of nine patches; two of the patches are assigned a CRITICAL designation and the remaining seven are assigned an IMPORTANT designation. Bulletin #1 applies to all current versions of Internet Explorer. However, it […]

Vulnerability in USB implementation allows covert malware actions

A topic scheduled to be presented during Blackhat 2014 deals with malicious actions that could originate from USB devices that have been altered to exfiltrate data from any computer that they are attached. The condition is not limited to only USB storage devices. It can also be performed on USB hardware such as keyboards, mice […]

Previous versions feature in Windows might assist in data recovery after cryptolocker

The SANS diary recently posted an article about utilizing the previous versions feature of Windows for data recovery in the case of cryptolocker. You can read more details about using the feature at the following link – https://isc.sans.edu/forums/diary/Windows+Previous+Versions+against+ransomware/18439

Advance notice of July Microsoft patches – to be released on July 8 at noon

Microsoft has just provided advance notice of the patches that are scheduled to be released on July 8 at 12 (noon cdt). The details as they are currently known are available at – https://technet.microsoft.com/library/security/ms14-jul  There are a total of six patches; two of which are assigned a designation of CRITICAL and three are assigned a […]

Cryptowall malware in circulation – sophos definition mal/zbot-rk

  A new variant of the cryptolocker/cryptowall malware has been identified.  When successful, the malware encrypts all data retained on the workstation before the process can be halted.  As of June 10, the malware has a current definition in Sophos (identified as mal/zbot-rk) but at least one user has suffered a data loss.   Some […]

Advance notice of patches to be released for June – to be released on June 10

Microsoft has just provided advance notice of the patches that are scheduled to be released on June 10 at 12 (noon). The details as they are currently known are available at – https://technet.microsoft.com/library/security/ms14-jun There are a total of seven patches; two of which are assigned a designation of CRITICAL and five are assigned a designation […]

Vulnerability in all gnuTLS versions released prior to 5/30

A vulnerability has been identified in the several open source TLS libraries that are commonly used on Linux systems. The vulnerability would allow a buffer overflow if exploited. If you run a Ubuntu or RedHat system, please check to see if a patch is available. The TLS versions that are vulnerable include all versions prior […]