When it comes to security updates, time is usually of the essence. The longer you wait to install a fix from a vendor, the higher the risk of being compromised. But in the cases of the Meltdown and Spectre flaws, you might be better off waiting until a more reliable patch is released.
Enlist IT help when installing CPU updates
Critical browser vulnerabilities discovered
According to security researchers, a bulk of the world’s computer processors have gaping flaws. The flaws, grouped under the term ‘Spectre,’ affect many critical systems including web browsers like Chrome, Safari, Microsoft Edge, and Firefox. Here’s a quick rundown of these major vulnerabilities and what you can do to secure them.
When Pre-installed Apps Create Risks
Bloatware is generally considered harmless, but what about when these unnecessary apps turn into a security risk? A recent report shows that a pre-installed app in some versions of Windows 10 had an alarming plugin flaw:
Tavis Ormandy, a researcher from Google's Project Zero, recently discovered that a compromised password management app, Keeper, had been installed with some versions of Windows 10. For a brief period, Keeper's browser extension, when enabled, allowed websites to easily steal login credentials.
Apple fixes major macOS security flaw
HP laptop users beware: keylogger found
Fight mobile malware with MTD
Protecting your business data goes beyond making sure your office computers and networks are safe. Because of this, businesses are recognizing the importance of a mobile threat detection (MTD) strategy, which puts up barriers in your company’s mobile devices in order to block mobile malware and other threats.
Chrome Cleanup tool’s enhanced features
If the browser you’re using can’t guarantee your safety, you could be one click away from downloading malware into your computer. Although it’s easy to click ‘X’ on suspicious pop-up ads, some threats are more difficult to detect. Google addresses this and other web safety risks by substantially changing Chrome’s security settings.
Spiced up security features on Android Oreo
There’s plenty to get excited about in Android 8.0: improved auto-fill functionality, picture-in-picture capability, greater notification control, and plenty more. While these features are all-impressive, Android has also included a number of significant security enhancements that you shouldn’t miss.
New Office attack method puts users in danger
From cloud hacks to malicious macros, hackers are becoming more creative in how they breach Microsoft Office. And although Microsoft releases security patches as soon as vulnerabilities are discovered, there’s a new hacking technique that allows cybercriminals to slip past traditional threat detection tools.
Equifax sheds light on incident response
What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same fate as Equifax, which is an interesting story we’re about to tell.