We’ve renewed so we’re still your Upstate area Microsoft Authorized Education Reseller!

Microsoft Authorized Education Reseller

Microsoft Authorized Education Reseller

We just renewed our standing as a Microsoft Authorized Education Reseller by filling out the forms, using their training material and passing the required test.

This enables us to continue to quote and ultimately sell Microsoft products to our Academic clients!

If you are aware of a school which is in need of a Microsoft product such as Microsoft Office, or Multipoint Server, please put them in touch with us!

 

Here’s the press release:

For Release 3:00 pm. March 17, 2014

 

Homeland Secure IT, LLC Renews as Microsoft Authorized Education Reseller

Homeland Secure IT, LLC earns distinction through commitment to academic customers.

Greenville, SC, USA — March 17, 2014 — Homeland Secure IT, LLC, a leading Upstate Technologies Provider, today announced it has renewed as a Microsoft Authorized Education Reseller (AER), demonstrating its ability to meet Microsoft academic customers’ evolving needs in today’s dynamic business environment. To earn a Microsoft AER authorization, partners must complete a test to prove their level of academic licensing and market expertise annually.

The AER program is designed to train participating resellers on Microsoft’s Academic licensing, authorize them to purchase and resell Microsoft Academic licenses, and demonstrate to potential customers that they are approved and knowledgeable academic partners.

Homeland Secure IT, LLC is a leading provider of computer, server and network sales, service and support in the Greenville and Upstate region of South Carolina for businesses, small and large, including the non-profit and education sectors.

“The renewal of the Microsoft AER authorization is yet another indicator of our continued commitment and specialization in the academic IT marketplace and demonstrates our knowledge of Microsoft and its academic products,” said John M. Hoyt CEO & Founder. “We hope to accelerate our academic customers’ successes by serving as technology advisors for their IT requirements.”

“By becoming AERs, partners show themselves to be committed and trained in providing discounted Microsoft academic products to the education market,” said Anthony Salcito, vice president of Education for Microsoft Corp.’s Worldwide Public Sector. “This authorization, along with our other education partner initiatives, gives our partners recognition of their areas of expertise and our academic customers the confidence that they are buying from academic IT specialists.”

The Microsoft AER Program is designed to authorize and equip organizations that deliver academic products and services through the Microsoft platform with the training, resources and support they need to provide their customers with superior experiences and outcomes.

About Homeland Secure IT, LLC:

Homeland Secure IT, LCC was founded in 2009 with the mission of providing IT services and products to businesses with a wide range of technology needs. As experts in the field, Homeland Secure IT, LLC helps these companies make the most of their existing IT investment and the select the right solutions to fuel future growth.

For more information:

John M. Hoyt
CEO and Founder
Homeland Secure IT, LLC
104 Mauldin Rd, STE E
Greenville, SC 29605 – USA
864-990-4748
http://www.HomelandSecureIT.com

 

Please use our CONTACT FORM if you prefer communication via email.

 

Edit: 2014-03-14 08:48 AM – Corrected date on press release. Thank you for the email Sam!

5

Credit card compromised? Maybe it was from a local establishment not Target…

A stack of credit cards

A stack of credit cards

Surely by now you’ve heard all about the Target breach, where credit cards were compromised… Maybe you were one of the bazillion who were affected, and you might have already replaced your card and moved on and put that out of your mind.

But, here’s a story about what appears to be a local breach, though we do not know the full details of how it happened yet.

Going back to February 26th 2014, I took a group of about 30 friends to a Greenville South Carolina entertainment venue called “Jack N’ Diane’s”, which features a fun dueling piano act. A great time was had by all! The entertainers were outstanding, the servers were attentive.

On Thursday March 6th , my wife Pamela asks, “Did you buy something from a grocery store in New York on the credit card?”… It was a small charge, like 29 dollars.  Nope, I had not been to a grocery store in New York….   Hmmmmmm….  Now alert to the situation, Pamela began looking more closely at our transactions online and found another charge for less than 10 dollars in Los Angeles.  We still had not been out of Greenville or made any purchases online.  Pamela had the card canceled with our bank after speaking with their fraud department.

The typical things associated with that ensued – such as getting a new card sent out from the bank. It did get us to talking though, and we discussed how that card is used for food and fuel mostly. So we started wondering just where our card number had been harvested. It came down to only a handful of places.  One of which was the local Jack N’ Diane’s. I posted to the groups on Facebook where my friends hang out asking if anyone else had seen fraudulent charges on their credit cards. Turns out, more than one had.  This number continues to grow.

Not all of our group used credit cards, but at least half did. This looked like more than a coincidence, so I called up Jack N’ Diane’s and spoke with a gentleman there who claimed to be a manager. I told him the situation and he explained that he doubted that a server (the human kind) was stealing credit cards, so that leaves their Point Of Sale (POS) system or the credit card processor that could be the culprit. The gentleman told me that their POS system was indeed out of compliance and that before April 1st they are scheduled to replace it.

I offered him the name of someone who could help RIGHT NOW, an Upstate food service POS expert, Toby Capece. He thanked me, but declined my offer and said they had someone already.

As of today, March 11th 2014, we have at least 9 people in our group confirming that they too had charges on their cards all over the place from California to New York, and even Canada.

I have called Greenville Police Department and spoken with two people, my wife spoke with one. They just said, “file a report”, once we have the bank statements in hand.

At this stage of the game, I am now simply wanting people to know that if they have been to Jack N’ Diane’s and used plastic, that they should check their statements closely.

I do find it very interesting that Jack N’ Diane’s Facebook page has now had “posts by others” disabled – which it was not prior to the date we visited there. Also, they have not posted a thing since mid February. Maybe others have posted about this? Either way, I feel it would be a great idea for JnD to post on their FB page a statement which reads something similar to: If you have visited JnD in the last 30 days, we ask that you examine your credit card statements closely to insure you have not received unexpected charges. If you have, please contact us and let us know when you were here, your bank, and file a report with Greenville PD.  We value your security as well as your business, so please know that we are doing everything we can possible to investigate if our systems have been compromised and to fix this!!!!!  Don’t hesitate to reach out to us at <phone number to a HUMAN>…

How could this happen?  Several ways off the top of my head that credit card data can be obtained from a POS:

1. A simple skimmer attached that obtains every card that is swiped and then the data is either retrieved by the person/s who placed it there, or it may have its own means of transmitting that data – WiFi, GMS, etc.

2. The POS machine can be exploited fairly easily – especially older systems that may be in use at JnD. Some run an insecure version of the now antiquated Microsoft XP Operating System which likely never gets security updates. REALLY easy if that machine is on a public WiFi.

3. If using WiFi – some older systems might not even encrypt the data transfer between terminals and the server – they have been deemed unsafe by PCI regulations and should not be in use.

4. Older systems used a dial-up connection – even slower and more antiquated, but still in use. These could easily be “tapped” physically. Last I checked, no encryption was in use.

5. A plethora of man-in-the-middle type exploits exists for these older POS systems.

6. Who’s to say that the credit card processing company has not been compromised?

That’s just a FEW of the literally dozens of ways this can happen outside of the intentional theft of cards by personnel, and is why PCI compliance audits are performed regularly.

If you accept credit cards at your business – please get an outside source to help with your compliance audits.  If you need help with that, call us at 864-990-4748 or use our CONTACT FORM.

If you were the victim of credit card fraud after going to Jack N’ Diane’s recently, or let’s say ANY local merchant, why not RESPOND to this post and tell me about it.

EDIT: 2014-03-11 11:23AM Eastern – Another person in the group has now discovered they were a victim too – 10 people total now.

EDIT: 2014-03-12 01:09 PM Eastern – WYFF has a news segment in which the feature this story HERE.

EDIT: 2014-03-12 2:55 PM Eastern – Jack N’ Diane’s has made a public statement on their facebook page acknowledging that their systems have been hacked and that they are in the process of correcting that now. It should be totally fixed in a couple days.

EDIT: 2014-03-14 2:58 PM Eastern – Another person from our group has been hit, seems we have 13 confirmed.

 

 

Zero Day Fixes for Microsoft IE and Adobe Flash Should be Applied Immediately

In case you have been wondering, there’s a very good reason for the most recent updates from Microsoft and Adobe… The vulnerabilities are being exploited and today I have heard of two people being affected.

It is our recommendation that you apply the fixes immediately in order to avoid this type of issue….

If you require any assistance or have question about these security concerns or any others in the Greenville SC area, please do not hesitate to call us at 864-990-4748

 

This information is provided courtesy of our Firewall and Security partner, WatchGuard….  You can find more information like this on their regular blog HERE

 

Subject: Grab Adobe and Microsoft’s Emergency Flash and IE Fixes

by: Corey Nachreiner

Let’s start with the short version. Yesterday, both Microsoft and Adobe released out-of-cycle updates to fix zero day security vulnerabilities that advanced attackers are exploiting in the wild via “watering hole” campaigns. If you use these products and haven’t installed the updates, go get the Flash and Internet Explorer (IE) fixes now!

The slightly longer story is early this week (during the U.S. President’s Day holiday) two security companies, FireEye and Websense, independently reported discovering two different legitimate web sites serving malware via a drive-by download attack. The web sites included a U.S Veteran’s site (VFW.org) and a French aeronautical company’s web site. The malicious code on these sites exploited two previously undiscovered, zero day vulnerabilities affecting Adobe Flash, and IE 9 and 10. They also delivered some relatively advanced trojan malware (in one case, Gh0strat), which has been used before in attacks that seem to come from China-based hackers. Since these sites have very specific user bases (military and ex-military, or aeronautical engineers), these attack campaigns fall into the category of watering hole attacks, where smart attackers purposely hijack web sites they know their target visits in hopes of poisoning the target’s watering hole. If you’d like to learn more about these types of attacks, and other web threats, you can check out a presentation I recently gave on the subject in a BrightTALK. You can also learn more about these specific attacks in this week’s upcoming security video.

In any case, yesterday both Microsoft and Adobe released advisories that include updates or FixIts that patch these zero day flaws. While you probably haven’t run into these exploits yet, unless you happen to fall into the two victim bases for these attacks, I expect criminal attackers to quickly start leveraging these new flaws. Now that they are public, you can expect criminal hackers to quickly incorporate the new attacks into the exploit kits they sell on the underground. Once they do, you’ll start to see these exploits popping up every where, to serve normal criminal malware. In other words, if you use IE or Flash, you should go get the updates immediately. You can find links to them in Microsoft and Adobe’s advisories. — Corey Nachreiner, CISSP (@SecAdept

XP is destined for obscurity – Time to give it up!

So long XP… I’d like to say it has been nice knowing you.

Here’s a little info about how the death of Microsoft’s XP Operating System may affect you and what is to come!
Goodbye to XP!

 

Goodbye to XP!

If you would like to discuss a migration to Windows 8 for your Greenville / Upstate business, whether it is for one computer or one thousand, please use our CONTACT FORM or give us a call at 864-990-4748. We can handle the sales and the migration.
We also offer computers pre-loaded with Windows 8 (and Windows 7) from every major manufacturer and our custom system builder.

 

 

Chase Away the Blues 2014

One of our favorite charity events of the year is just around the corner and we hope you will make plans to attend. In fact, if you have a business here in the Greenville South Carolina area, we hope you will help sponsor the event!

Chase Away the Blues takes place on February 21st and 22nd, and will feature two evenings of awesome live music from rock legends Black Oak Arkansas and South Carolina’s own Blue Dogs. The opening acts are Decadent Daze and Wanda Johnson, respectively. This all goes down at The Handlebar in Greenville, SC.

Be sure to get your tickets early, as both evenings are expected to sell out.

I’ve attached the event poster, but you can find out more in a dynamic manner at:

Chase Away The Blues – Facebook Page

Homeland Secure IT is proud to help sponsor this event as proceeds go to Compass of Carolina, who assists families and victims of domestic violence right here in the Upstate!

Chase Away the Blues

Chase Away the Blues

 

See ya there!

 

Baby it’s cold outside… Supercooling & Snap Freezing Experiment 2014

I know, you’ve seen this before, but every winter it seems like I post a video of this… Simple people like me are easily amused I reckon.

Here’s a bottle of water freezing instantly this morning (January 22nd, 2014):

 

On a more business-like note, I’ll be posting about the end of Microsoft Windows XP support soon, I hope you will watch for it and pay attention if you have older machines. It’s time to update, and Homeland Secure IT can help you do so here in the Upstate of SC. Feel free to call us at 864-990-4748 if you need any assistance with your business or personal computer or network!

Merry Christmas 2013!

We would like to wish you a very Merry Christmas!

Hopefully you will spend it in good health and high spirits with your family and friends. Or, at the very least, with a pet that loves you!

If you are travelling, watch out for the loonies and get back the Upstate safely.

Homeland Secure IT is going to close today, Monday, December 23rd a little bit early, and will not return until Friday the 27th as we want to spend this time of the year with family ourselves and reflect on what this season is all about.

Should you need emergency assistance with your business computer, server or network, calling our office at 864-990-4748 and leaving a message will result in all of us getting it in our inbox, or you can send an email like you are used to doing and we will get with you as quickly as possible.

God bless!

Thanksgiving 2013 – Hours

We would like to wish you a very happy and safe Thanksgiving….

May you get to spend it with family and/or loved ones!

In order that we may spend time with our families, the office will be closed on Thanksgiving Day and on Friday, November 29th.

We will resume normal hours on Monday, November 2nd, 2013.

Should you need us for an emergency, please call our office at 864-990-4748 and hit 0 – leave a message and we will all receive it and the first available person will respond!

We hope you know that we are thankful for so many things, including our ability to serve you…

Zero Day Vulnerabilities addressed by Adobe and Microsoft – Get it while it’s hot!

It’s time for updates to come out from from your favorite software vendors, and whether you are using a Windows based PC or a Mac, there’s something for you this month!

Applying these updates is VERY IMPORTANT – your machines are vulnerable unless you take steps to secure them.

Up for your patching pleasure are the following (as listed by our partner, WatchGuard on their security blog):

 

Adobe Patch Day: Zero Day ColdFusion Patch & Flash Update

by Corey Nachreiner

Severity: High

Summary:

  • These vulnerabilities affect: Adobe Flash Player and ColdFusion
  • How an attacker exploits them: Multiple vectors of attack, including enticing your users to open malicious files or into visiting specially crafted web sites
  • Impact: Various results; in the worst case, an attacker can gain complete control of your computer
  • What to do: Install the appropriate Adobe patches immediately, or let Adobe’s updater do it for you.

Exposure:

Today, Adobe released two security bulletins describing vulnerabilities in Flash Player and ColdFusion. A remote attacker could exploit the worst of these flaws to gain complete control of your computer. The summary below details some of the vulnerabilities in these popular software packages.

 

  • APSB13-26: Four Flash Player Memory Corruption Flaws

Adobe Flash Player displays interactive, animated web content called Flash. Many users install Flash, so it’s likely present on many of your Windows and Mac computers.

Adobe’s bulletin describes two unspecified memory corruption vulnerabilities in Flash Player running on all platforms. Though the flaws presumably differ technically, they share the same scope and impact. If an attacker can lure you to a web site, or get you to open a document containing specially crafted Flash content, he could exploit these flaws to execute code on your computer, with your privileges. If you have administrative or root privileges, the attacker could gain full control of your computer.

Adobe assigned these flaws their highest severity rating for Windows and Mac computers, but a lesser severity for Linux machines.

Adobe Priority Rating: 1 for Windows and Mac (Patch within 72 hours)

Adobe ColdFusion is an application server that allows you to develop and deploy web applications. It suffers from two security vulnerabilities, which Adobe does not describe in much technical detail; a reflected cross site scripting (XSS) vulnerability (CVE-2013-5326), and an unauthorized remote read access flaw  (CVE-2013-5328).  Other than that, the bulletin shares very little about the scope or impact of these flaws, so we’re unsure how easy or hard it is for attackers to leverage them. Presumably, if an attacker could trick someone in clicking a specially crafted link, he could leverage the XSS flaw to do anything on your web site that the user could. We also assume an attacker could exploit the remote read flaw to potentially gain access to files on your server, such as its web application source code. In any case, they rate the vulnerabilities as Priority 1 issues for version 10, which is their high severity rating.

As an aside, Adobe’s own network was recently breached via a zero day flaw in ColdFusion. Adobe claims these ColdFusion issues are not associated with their network breach. However, the discoverer of one of the issues, Alex Holden, was actually one of the researchers who uncovered Adobe’s data breach, and he claims one of the flaws has been used by attackers this year to break into other companies. In other words, you should apply these updates immediately if you use ColdFusion

Adobe Priority Rating: 1 for version 10 (Patch within 72 hours)

Solution Path:

Adobe has released updates for all their affected software. If you use any of the software below, we recommend you download and deploy the corresponding updates as soon as possible, or let Adobe’s automatic updater do it for you:

APSB13-26: Upgrade to the latest Flash Player (11.9.900.152 for Windows)

 

Office Updates Mend Word and Outlook Vulnerabilities

by Corey Nachreiner

Severity: High

Summary:

  • These vulnerabilities affect: Microsoft Office related products, including Word and Outlook
  • How an attacker exploits them: Typically by enticing users to open or interact with maliciously crafted Office documents or email
  • Impact: In the worst case, an attacker can gain complete control of your Windows computer
  • What to do: Install the appropriate Microsoft patches as soon as possible, or let Windows Automatic Update do it for you.

Exposure:

Today, Microsoft released two security bulletins that fix four vulnerabilities in Word and Outlook. We summarize the bulletins below, in order from highest to lowest severity.

  • MS13-091: Multiple Word Memory Corruption Vulnerabilities

Word is the popular word processor that ships with Office.  It suffers from three memory corruption vulnerabilities having to do with how it handles malformed Word and WordPerfect files. They all differ technically, but share the same scope and impact. By luring one of your users into downloading and opening a malicious Word or WordPerfect document, an attacker can exploit any of these flaws to execute code on that user’s computer, with that user’s privileges. If your users have local administrator privileges, the attacker gains complete control of their PCs. These flaws affect all versions of Word except for Word for Mac.

Microsoft rating: Important

  • MS13-094:  Outlook S/MIME Information Disclosure Flaw

Outlook is the popular Windows email client that ships with Office. Secure/Multipurpose Internet Mail Extensions (S/MIME) is a standard for encrypting MIME data, or put more simply, it allows you to encrypt email. Outlook suffers from an information disclosure vulnerability involving the way it handles specially crafted S/MIME certificates. By convincing one of your users to open or preview a malicious email with a specially crafted S/MIME certification, an attacker could exploit this flaw to learn a bit about the victim system, including its IP address and the ports it listens on. However, the attacker could not leverage the flaw to compromise the victim system.

Microsoft rating: Important

Solution Path:

Microsoft has released Office-related patches that correct all of these vulnerabilities. You should download, test, and deploy the appropriate updates throughout your network as soon as possible. If you choose, you can also let Windows Update automatically download and install these updates for you.

The links below point directly to the “Affected and Non-Affected Software” section of each bulletin, where you can find all of Microsoft’s update links:

MS13-094

 

One of Windows’ Five Updates Fixes a Zero Day Flaw

by Corey Nachreiner

Severity: High

Summary:

  • These vulnerabilities affect: All current versions of Windows
  • How an attacker exploits them: Multiple vectors of attack, including luring users to malicious web sites or into opening malicious files
  • Impact: In the worst case, an attacker can gain complete control of your Windows computer
  • What to do: Install the appropriate Microsoft patches as soon as possible, or let Windows Automatic Update do it for you

Exposure:

Today, Microsoft released five security bulletins describing a like number of vulnerabilities in Windows and its components. A remote attacker could exploit the worst of these flaws to potentially gain complete control of your Windows PC. We recommend you download, test, and deploy these critical updates as quickly as possible.

The summary below lists the vulnerabilities, in order from highest to lowest severity.

  • MS13-090: ActivX Control Code Execution Vulnerability

ActiveX controls are essentially small programs, often shared between applications, that work behind the scenes performing minor tasks on Windows-based computers. They are kind of like Microsoft-only Java applets. Many Microsoft products, including Windows, ship with many different ActiveX controls for performing various tasks.

Unfortunately, a particular Windows ActiveX control (InformationCardSigninHelper) that Internet Explorer (IE) uses suffers from a remote code execution vulnerability. If an attacker can entice one of your users into visiting a maliciously crafted web page, he can exploit this flaw to execute code on that user’s computer, inheriting that user’s level of privileges. If your user has local administrative privileges, the attacker gains full control of the user’s machine.

Researchers first discovered attackers exploiting this flaw in the wild. They’re currently exploiting it in advanced, targeted attacks. For that reason, we recommend you apply this patch as quickly as you can.

Microsoft rating: Critical

  • MS13-089:  GDI Integer Overflow Vulnerability

The Graphics Device Interface (GDI) is one of the Windows components that helps applications output graphics to your display or printer. GDI suffers from an integer overflow vulnerability involving its inability to properly handle specially malformed Windows Write (.wri) files. By luring one of your users into opening a Write file in WordPad, an attacker could leverage this flaw to execute code on that user’s computer, with that user’s privileges. If your users have local administrative privileges, the attacker gains full control of their computer.

Microsoft rating: Critical

  • MS13-092: Hyper-V Elevation of Privilege Vulnerability

Hyper-V is Microsoft’s virtualization platform, which ships with the latest versions of Windows Server. It suffers from an elevation of privilege vulnerability having to do with how it handles specially crafted hypercalls. If an attacker has administrative privileges on a guest virtual machine (VM) running on your Windows Hyper-V server, she can exploit this flaw to either crash the Hyper-V host and all your VMs, or to execute arbitrary code on one of the other guest VMs running on the same physical server. This flaw only affects Windows 8 x64 Edition and Windows Server 2012.

Microsoft rating: Important

  • MS13-093:  AFD Information Disclosure Flaw

The Ancillary Function Driver (AFD) is a Windows component that helps manage Winsock TCP/IP communications. It suffers from a vulnerability involving the data it copies from kernel memory to user memory. In a nutshell, if a local attacker can log into one of your Windows computers and run a custom program, he could leverage this flaw to gain access to information in kernel space that he shouldn’t have access to. However, the attacker would need valid credentials on the target system, and could not leverage the flaw to elevate his privileges. This flaw only poses a minor risk.

Microsoft rating: Important

  • MS13-095:  Digital Signature Handling DoS Flaw

Windows ships with various components that allow it to handle the digital certificates and signatures used to establish secure communications. Unfortunately, Windows does not properly handle malformed X.509 certificates. By sending a specially crafted X.509 certificate to a Windows web server, an attacker could can a denial of service (DoS) condition, preventing the web server from responding future requests.

Microsoft rating: Important

Solution Path:

Microsoft has released various updates that correct all of these vulnerabilities. You should download, test, and deploy the appropriate updates throughout your network immediately. If you choose, you can also let Windows Update automatically download and install them for you. As always, you should test your updates before deploying them. Especially, server related updates.

The links below point directly to the “Affected and Non-Affected Software” section of each bulletin, where you can find links to the various updates:

These alerts were researched and written by Corey Nachreiner, CISSP (@SecAdept).

 

As always, should you have issues applying these patches / updates, or questions, please do not hesitate to reach out to us if you are in the Greenville / Upstate SC area.  864-990-4748

Windows users being exploited due to a TIFF issue

You need to be aware of this… Reposting from one of our partner’s blogs…  WatchGuard:

 

Attackers Exploiting a Zero Day in Windows, Office, and Lync

by Corey Nachreiner

Today, Microsoft released a critical security advisory warning customers of a serious new zero day vulnerability that affects Windows, Office, and Lync.

In a nutshell, the vulnerability has to do with how certain versions of Windows, Office, and Lync handle specially crafted TIFF images. If an attacker can trick you into viewing a malicious image, including ones embedded in Office documents, he can exploit this flaw to execute code on your computer, with your privileges. If you have local administrative permissions, as most Windows users do, they attacker gains complete control of your computer.

McAfee researchers first discovered this flaw being exploited in the wild, and they share some interesting details about the issue on their blog (Microsoft also shares some extra technical detail here). While the flaw lies in Microsoft’s image handling components (GDI+), the public attack actually arrives as a malicious Word document with an embedded TIFF, which the attackers send via email. Microsoft claims attackers are only exploiting the flaw in limited, targeted cases.

Since they just learned about the flaw recently, Microsoft hasn’t had time to patch it yet. However, they have released a FixIt which mitigates the issue. FixIts are not considered full patches, but they can protect you until Microsoft releases their final update. If you use any of the affected versions of Windows, Office, or Lync, I highly recommend you apply the FixIt as soon as you can. Microsoft does also offers a few other workarounds, such as disabling the TIFF codec, or using the EMET tool (something I suggest you do in general), but I think the FixIt is the quickest and most reliable solution.

I’ll continue to follow this issue as it evolves, and will post here as soon as Microsoft releases a patch. — Corey Nachreiner, CISSP (@SecAdept)

Corey Nachreiner | November 5, 2013 at 6:31 pm | Tags: 0day, exploit, Lync, memory corruption, office, remote code execution, TIFF, windows, zeroday | Categories: Security Updates | URL: http://wp.me/pVP8E-1cn