Microsoft released an update that will fix two privately reported vulnerabilities on Internet Explorer. The vulnerability was affecting Internet Explorer version 6 to 11. Read More »
Apple has released updates to OS X and iTunes to address multiple vulnerabilities, some of which could allow an attacker to execute arbitrary code, obtain website credentials, or take control of the affected system.
Updates are available:
1: OS X Mavericks 10.9.3 for OS X Mavericks 10.9 to 10.9.2
2: iTunes 11.2 for Windows 8, 7, Vista, and XP SP3 or later
Users and administrators are encouraged to review Apple Security Updates HT6246 and HT6245, and apply the necessary updates.
Adobe has released security updates to address multiple vulnerabilities in Reader, Acrobat, Flash Player, and Illustrator. Exploitation of these vulnerabilities could potentially allow an attacker to take control of the affected system.
The following updates are available:
- Adobe Reader XI 11.0.07 for Windows and Macintosh
- Adobe Reader X 10.1.10 for Windows and Macintosh
- Adobe Acrobat XI (11.0.07) for Windows and Macintosh
- Adobe Acrobat X (10.1.10) for Windows and Macintosh
- Adobe Flash Player 184.108.40.206 for Windows, Macintosh, and Linux
- Adobe Flash Player 220.127.116.119 for Linux
- Adobe AIR SDK and Compiler 18.104.22.168 for Windows and Macintosh
- Adobe Illustrator (subscription) 16.2.2 for Windows and Macintosh
- Adobe Illustrator (non-subscription) 16.0.5 for Windows and Macintosh
- Users and administrators are encouraged to review Adobe Security Bulletins APSB14-11, APSB14-14, and APSB14-15 and apply the necessary updates.
Google has released security updates to address multiple vulnerabilities in Chrome. Some of these vulnerabilities may lead to memory corruption or arbitrary code execution. Read More »
Many organisations may have a false sense of security resulting from their investments in non-agile security tools and processes they have relied on for years. Yet firewalls, antivirus, intrusion detection systems (IDS) and intrusion prevention systems (IPS) are increasingly less effective as attackers leverage encryption and other innovative techniques to evade them.