Microsoft Releases Security Intelligence Report for your reading pleasure… SIRv11

Microsoft has released Volume 11 of their “Microsoft Security Intelligence Report” or SIRv11, which provides “An in-depth perspective on software vulnerabilities and exploits, malicious code threats, and potentially unwanted software in the first half of 2011”. One tidbit of interesting information contained in the report is that in the first half of 2011, less than one percent of exploits were …

Which security standards and awareness compliance requirements apply to your organization?

I came across a very handy document from www.securingthehuman.org that explains which security standards and awareness compliance requirements might apply to your organization. It is by no means a complete listing, but gives the one minute run-down of the majority of the biggies…. — Last Updated: 19 July, 2011 1. Executive Summary The purpose of this document is to identify …

October updates for Apple products… Patch ’em up!

Apple released a slew of updates to address major security vulnerabilities this week… Be sure get your devices up to date… OS X Lion v10.7.2 and Security Update 2011-006 iTunes 10.5 Safari 5.1.1 iOS 5 Software Update Numbers for iOS v1.5 Pages for iOS v1.5 Apple TV 4.4 A few of these provide you with additional features, such as the …

Coming this October 11th – Microsoft brings you patchy goodness!

Microsoft is bringing you patchy goodness this coming “Patch Tuesday”, October 11th. Please update your machines to insure your network is secure. There is a little something for everyone!  Desktops and servers will receive Microsoft’s love. This is from the Microsoft Security Bulletin Advance Notification for October 2011:   Critical Security Bulletins ============================   Bulletin 1   – Affected Software: …

Seven must-have technologies for your small business

One conversation new or potential business owners may want to have with their IT professionals is about what technologies exist that can improve their life. Below you will find some that are must haves… Smartphones: Whether it is an Android, iPhone or even a Windows based phone, you cannot survive without one. These devices provide instant communication with your clients …

HTC logging tools may expose your EVO 3D, 4G or Thunderbolt Android smartphone information

An interesting article was pointed out to me over on the AndroidPolice.com site that says, “Massive Security Vulnerability In HTC Android Devices (EVO 3D, 4G, Thunderbolt, Others) Exposes Phone Numbers, GPS, SMS, Emails, Address, Much More“… This article pretty much says it all… There is even a work-around, but not an official fix for the security vulnerability from HTC as …

IronKey D200 32GB USB storage devices offer high speed transfer and auditable encryption

I’m often asked which is the best USB flash drive you can buy. My answer varies with the requirements of the individual or business that will utilize the device. The average person requires a fast and reliable storage device to shuttle files to/from work or school, and does not require security features at all, but for those who do require …

Google is planning to put an end to SSL exploits, hopefully before they happen with Chrome

The other day I posted about the BEAST that can circumvent SSL encryption used with websites and how a proof of concept would be demonstrated soon and actual exploits in the wild even sooner. No sooner had I posted about that than Google’s Chrome development team had posted that they have an update already prepared for the Chrome browser that …

Old and busted – MBR viruses… New hotness – BIOS viruses (again)

This may come as no surprise to those who have been around computer security for a while, but the BIOS viruses are making a comeback! One of the first made its debut back in 1999 and was known as “CIH”.  But Symantec is reporting a new killer on the block called “Trojan.Mebromi” that affects the Award BIOS and seizes control …

Microsoft updates for Windows, Windows Server and Microsoft Office for Sept 13, 2011

Multiple vulnerabilities in MS Windows, MS Windows Server and Microsoft Office have been identified and addressed.  These should not be taken lightly as they are of a critical nature, allowing a “remote, unauthenticated attacker” the ability to gain access to your system, as well as DoS. If you require assistance applying updates to your business computers in the Greenville / …