![]() |
![]() |
![]() |
Third on your list of priorities is MS13–083, a critical patch for Windows Common Control Library across all platforms except Windows Server 2012 R2 and Windows RT 8.1 and addresses one privately reported vulnerability that could allow for a remote code execution. There are no known active attacks.
Microsoft released eight patches this October Patch Tuesday - four critical and four important. The vulnerabilities in IE have been patched thankfully and the bulk of the October issues do not impact the current code base. Paul Henry, security and forensics analyst at Lumension, provides more on the updates.
Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance
To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ... More >>
Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ... More >>
Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ... More >>