• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Author / Jonathan Leopando (Technical Communications)

Jonathan Leopando

Technical Communications

Patch Tuesday of November 2016: Six Critical Bulletins, Eight Important

  • Posted on:November 8, 2016
  • Posted in:Vulnerabilities
  • Posted by:
    Jonathan Leopando (Technical Communications)
0

November is the second-to-last Patch Tuesday of 2016, and it brings a slightly higher than typical number of bulletins: six Critical bulletins and eight Important bulletins. The 8th is the earliest date that Patch Tuesday can take place in a month; December’s Patch Tuesday (and the last of 2016) takes place in exactly five weeks. Among the items fixed today was the zero-day vulnerability in Windows that was used in the same attacks at the Adobe Flash Player zero-day in late October.

Read More
Tags: November 2016Patch Tuesday

Patch Your Flash: Another Zero-Day Vulnerability Hits Adobe Flash

  • Posted on:October 27, 2016
  • Posted in:Exploits, Vulnerabilities
  • Posted by:
    Jonathan Leopando (Technical Communications)
0

Adobe has released an out-of-bound patch for Flash Player due to a zero-day vulnerability. According to Adobe’s bulletin (APSB16-36), versions of Flash from 23.0.0.185 and earlier (released on October 11) are affected. (Adobe Flash Player for Linux uses a separate version numbering system; for that product versions 11.2.202.637 and earlier are vulnerable.) We urge all users who still have Flash installed to update to the version released today as soon as possible.

Read More
Tags: Adobe Flash Playerzero-day vulnerability

September Patch Tuesday: Browser, Exchange, Office Bugs Dominate

  • Posted on:September 14, 2016
  • Posted in:Vulnerabilities
  • Posted by:
    Jonathan Leopando (Technical Communications)
0

The second Tuesday of the month is here, which means one thing – new patches from Microsoft. Compared to recent months, September’s batch of patches is slightly larger with 14 bulletins in all, evenly split between Critical and Important ones.

Read More
Tags: Exchange ServerPatch Tuesday

August Patch Tuesday: Nine Bulletins, Five Rated Critical

  • Posted on:August 9, 2016
  • Posted in:Vulnerabilities
  • Posted by:
    Jonathan Leopando (Technical Communications)
0

The second Tuesday of August has arrived, which means one thing for Microsoft users: Patch Tuesday. Relatively speaking, August’s batch of patches is relatively light, with only nine bulletins, although five are rated as Critical.

Read More
Tags: August 2016Patch Tuesday

Two-Factor Authentication and SMS Messages: Don’t Let The Perfect Be The Enemy Of The Good

  • Posted on:August 2, 2016
  • Posted in:Social
  • Posted by:
    Jonathan Leopando (Technical Communications)
0

Last week, a lot of tech media sites were breathlessly reporting how the National Institute of Science and Technology in the United States was saying that two-factor authentication (2FA) via SMS messages would be “deprecated” in future standards. Some took this to mean that this technique was insecure, and that users should shy away from this method. Let’s step back and see what the NIST really said:

Read More
Tags: 2FANISTtwo-factor authentication
Page 1 of 3012 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.