IT Gets a Summer Vacation with Light Patch Load for June

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next IT Gets a Summer Vacation with Light Patch Load for June-4 Next

Your next two priorities will be bulletins 3 and 4. Bulletin 3 is an important denial of service issue affecting kernel mode drivers. It does affect the newest operating systems, Windows 8 and Windows RT. This vulnerability occurs in the TCP/IP stack when handling SYN cookies. To trigger the issue, you have to flood the system with a bunch of SYN packets and have the SYN protection and tracking turned on. Once that happens, an attacker could trigger a denial of service vulnerability. There should be network-level mitigation in place already to stop the flooding.

It’s a record month for Microsoft this month, according to Paul Henry, security and forensic analyst at Lumension. With just five bulletins, June marks the lowest number of bulletins we’ve seen from Microsoft to date this year, making it a light month for IT admins. It’s also the halfway point for the year, which is always a good time to look back at last year and compare. With 50 total bulletins for the year, Microsoft has issued a total of eight more bulletins this year than at the same time last year. Interestingly, the company has issued exactly the same number of critical bulletins so far this year at 16. That means the balance is made up of important bulletins, which are the type of bulletins we prefer to see.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.