Microsoft Security Essentials Update

Published: 2010-12-17
Last Updated: 2010-12-17 20:36:31 UTC
by Joel Esler (Version: 1)
0 comment(s)

Thanks to reader Hurin:

We were notified that a new version of Microsoft's Security Essentials is now available for download from Windows Update.  Check it out, or grab it from here:

http://www.microsoft.com/security_essentials/

 

-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler

Keywords:
0 comment(s)

Opera 11.00 has been released!

Published: 2010-12-17
Last Updated: 2010-12-17 19:49:48 UTC
by Joel Esler (Version: 1)
0 comment(s)

For those of you that use Opera (all 2.20% of you), the folks over there have released version 11.00.  There are a ton of updates to the code, including many security related fixes, so check out the Changelog here:

http://www.opera.com/docs/changelogs

and download it here:

http://www.opera.com/browser/

Thanks Roseman for writing in!

-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler

Keywords:
0 comment(s)

Apple Time Capsule and Airport Base Station Updates

Published: 2010-12-17
Last Updated: 2010-12-17 19:45:37 UTC
by Joel Esler (Version: 1)
1 comment(s)

Published yesterday, Apple released a new firmware update for it's Time Capsule and Airport Base Station devices covering the following CVE's:

  • CVE-2008-4309
  • CVE-2009-2189
  • CVE-2010-0039
  • CVE-2009-1574
  • CVE-2010-1804

If you are using these pieces of hardware, please be sure and update.  (I already have!)

-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler

Keywords:
1 comment(s)

Reports of Attacks against EXIM vulnerability

Published: 2010-12-17
Last Updated: 2010-12-17 17:40:25 UTC
by Johannes Ullrich (Version: 1)
4 comment(s)

Users of the popular exim mail server report attacks exploiting the recently patches vulnerability [1,2].  It appears that the attacks are scripted and installing popular rootkits. If you experienced an attack against exim: We are interested in packet captures or other logs showing how the attack is performed.

[1] http://www.reddit.com/r/netsec/comments/en650/details_of_the_root_kit_that_got_installed_on_my/
[2] http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html

------
Johannes B. Ullrich, Ph.D.
SANS Technology Institute
Twitter

Keywords: exim
4 comment(s)

Comments

cwqwqwq
eweew<a href="https://www.seocheckin.com/edu-sites-list/">mashood</a>
WQwqwqwq[url=https://www.seocheckin.com/edu-sites-list/]mashood[/url]
dwqqqwqwq mashood
[https://isc.sans.edu/diary.html](https://isc.sans.edu/diary.html)
[https://isc.sans.edu/diary.html | https://isc.sans.edu/diary.html]
What's this all about ..?
password reveal .
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure:

<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.

<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
https://thehomestore.com.pk/

Diary Archives