HP – Hewlett Packard Partner

HP / Hewlett-Packard, a renown manufacturer of computers, servers, switches, printers and more. By partnering with HP, we are able to provide the highest level of support possible to our clients as well as providing sales of HP products at reasonable prices.

HP offers a large assortment of IT components and services, which we are able to provide at reasonable rates.

A few offerings:

Computer – Notebook, laptop, mini netbook, ultra portable, desktop, all-in-one, graphic workstation, tablet, mobile

Server – File server, blade server, micro server

Network – Switch, router, storage, backup

Other – Printer, all-in-one, monitor

 

Whatever your need for business or even small home office, HP probably has the product.

We are happy to offer sales, support, service & repair of HP products and services in Greenville / Upstate SC.  Please call 864.990.4748 or use our handy CONTACT form for more information!

AVTECH Server Room Monitoring Partner

We are your Greenville / Upstate AVTECH partner offering consultation, sales and support of server room temperature, humidity, intrusion detection monitoring systems.

Environment Monitoring in computer rooms, data centers and other facilities has become a critical part of ‘Disaster Prevention’ for professional managers everywhere. The reason is that a typical IT infrastructure supports the entire organization. Without continued operation of IT resources, an organization may have no access to information, databases, email or the internet. Even worse, an organization may appear ‘out of business’, ‘unstable’ or simply ‘irrelevant’.

The most common environment problems encountered in today’s IT facilities are air conditioning and power failure. Air conditioning failure can lead to high temperatures, high or low humidity, water flooding and more. Power failure can lead to costly network, server, and website downtime – nevermind the cost to replace or fix expensive systems. Extreme temperature changes due to heating or cooling equipment failure and even seasonal changes can damage hardware, threaten uptime, block network access and destroy data. During downtime, ongoing costs continue to accrue while more and more profits are lost. Thankfully, there are easy, inexpensive and proven solutions available from AVTECH to prevent environment caused disasters.

Consider The Facts:

Failure of a primary or backup air conditioner is a major threat in any data center. It is the #1 cause of overheating and environment related downtime.

The power consumption used by the typical data center rose 39% over the last 5 years.
Given the average power consumption in a data center today, if cooling is lost, temperatures will rise from 68° F to over 85° F in approximately 8.6 minutes.
For every 18 degree rise in temperature above 68° F, servers lose approximately 50% of their reliability.
61% of data centers say downtime was due to environmental issues 1X in the past 12 months and 23% say that it caused downtime 5X in the past 12 months all lasting anywhere between 1/2 and 3 days.
On average, 45% of downtime incidents will cost $10,000 or more.

AVTECH offers Room Alert and TemPageR solutions for IT & facilities temperature and environment monitoring. These solutions save billions of dollars each year for organizations worldwide by allowing them to monitor temperature, humidity, power, flood, smoke, room entry, air flow and more in their computer rooms, data centers and/or other facilities where expensive equipment is housed. Users can log and graph data, send alerts when conditions change, take automatic action to shutdown servers or start back up systems when issues occur; all managed through a web interface via a single IP address. All monitors include a FREE license for AVTECH’s powerful Device ManageR software for advanced discovery, management, monitoring, logging, alerting, automatic corrective and more.
Protect Your IT Facility… Don’t Wait Until It’s Too Late!

Call us at 864.990.4748 or use our handy CONTACT form to get more information!

Symantec Registered Partner

Symantec is the leading provider of business backup & archival software such as Backup Exec, Endpoint Protection like Norton, and messaging security (Brightmail).

As a partner, we can offer your business these products and the continued support and licensing your company needs.

Whether your company requires one seat or ten thousand seats, we can provide for your license needs. Contact us today at 864.990.4748 or use our CONTACT form or visit our Symantec Showcase for highlights of products.

SECURE IT ALERT: Technical Cyber Security Alert TA12-101A covers MS patches

Secure IT Alert Header

Homeland Secure IT Alert

Homeland Secure IT Alert for Tuesday, April 10th, 2012

This is from the US-CERT team, reposted as received. If you require assistance with these Microsoft security updates, or any others, please call upon us at 864.990.4748 or use our handy CONTACT form.

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA1

 

 

National Cyber Awareness System

 

Technical Cyber Security Alert TA12-101A

 

 

Microsoft Updates for Multiple Vulnerabilities

 

Original release date: April 10, 2012

Last revised: —

Source: US-CERT

 

 

Systems Affected

 

* Microsoft Windows

* Microsoft Internet Explorer

* Microsoft .NET Framework

* Microsoft Office

* Microsoft Server Software

* Microsoft SQL Server

* Microsoft Developer Tools

* Microsoft Forefront United Access Gateway

 

 

Overview

 

There are multiple vulnerabilities in Microsoft Windows, Internet

Explorer, Microsoft .NET Framework, Microsoft Office, Microsoft

Server Software, Microsoft SQL Server, Microsoft Developer Tools,

and Microsoft Forefront United Access Gateway.  Microsoft has

released updates to address these vulnerabilities.

 

 

Description

 

The Microsoft Security Bulletin Summary for April 2012 describes

multiple vulnerabilities in Microsoft software. Microsoft has

released updates to address the vulnerabilities.

 

 

Impact

 

A remote, unauthenticated attacker could execute arbitrary code,

cause a denial of service, or gain unauthorized access to your

files or system.

 

 

Solution

 

Apply updates

 

Microsoft has provided updates for these vulnerabilities in the

Microsoft Security Bulletin Summary for April 2012, which describes

any known issues related to the updates. Administrators are

encouraged to note these issues and test for any potentially

adverse effects. In addition, administrators should consider using

an automated update distribution system such as Windows Server

Update Services (WSUS). Home users are encouraged to enable

automatic updates.

 

 

References

 

* Microsoft Security Bulletin Summary for April 2012 –

<http://technet.microsoft.com/en-us/security/bulletin/ms12-apr>

 

* Microsoft Windows Server Update Services –

<http://technet.microsoft.com/en-us/wsus/default.aspx>

 

* Microsoft Update – <https://www.update.microsoft.com/>

 

* Microsoft Update Overview –

<http://www.microsoft.com/security/updates/mu.aspx>

 

* Turn Automatic Updating On or Off –

<http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off>

 

 

Revision History

 

April 10, 2012: Initial release

 

____________________________________________________________________

 

Feedback can be directed to US-CERT Technical Staff. Please send

email to <cert@cert.org> with “TA12-101A Feedback VU#507275” in

the subject.

____________________________________________________________________

 

Produced by US-CERT, a government organization.

____________________________________________________________________

 

This product is provided subject to the Notification as indicated here:

http://www.us-cert.gov/legal.html#notify

 

This document can also be found at

http://www.us-cert.gov/cas/techalerts/TA12-101A.html

 

For instructions on subscribing to or unsubscribing from this mailing list, visit http://www.us-cert.gov/cas/signup.html

—–BEGIN PGP SIGNATURE—–

Version: GnuPG v1.4.5 (GNU/Linux)

 

iQEVAwUBT4R9vT/GkGVXE7GMAQJ9Kwf+KD4RrpgeT6CAAgILeIFesdYAGWvVBkS2

2HvmfVPJzwddWuPq66BHM+gfHHSIQ7l2zySp7U/pmAzAJ4xmsxg0Jog+R4IfOcDG

qRUprowI1Uf6hdSZbsQz2Z3KJgcs3DrT7WxgTmbFVk7ezlkFUO1dn+hcAlmWSRzU

nKjZBFOswTQqhrOIHit8BxKewt5vD4qwx37Rm2d8QrVaqohf40ih15ArK+VonU4b

MB29KEtcNDKoaCRVBiKj1rgiGuLCVhYoz7aPq3ey4zTnFtqkU4zZR4hv+FaUJ4kO

2UCQzfsnMp3JDY+K68E+AchH0PtYOi2T5Dp3gtqdleaxr+tWOdShRg==

=Iv8O

—–END PGP SIGNATURE—–

 

WatchGuard Technologies Registered Partner

We’re a WatchGuard Technologies Registered Partner offering sales, installation and support of all WatchGuard security products and services including firewall, email and web security, data loss prevention and UTM and various other small business security solutions.

For more information, please call 864.990.4748 or use our CONTACT form.

SNOM Registered VAR

snom – SIP based IP phone sales, service, support and consultation in Greenville / Upstate, SC

Homeland Secure IT is a registered Value Added Reseller of snom products, providing state of the art VoIP handsets for use with a variety of Voice over IP solutions.

If you would like more information about snom phones and devices, please call us at 864.990.4748 or contact us via the CONTACT form.

Microsoft Small Business Specialist Partner

Microsoft Registered Partners are closely aligned with Microsoft to stay current with the latest Microsoft technology and serve customers more effectively. Microsoft Registered Partners encompass a broad range of expertise and vendor affiliations and their real world perspective can help you prioritize and effectively deliver your technology solutions.

As a Microsoft Small Business Specialist, we are specially positioned to help Small and Medium sized businesses with their Microsoft needs, whether it is a server, workstation, mobile device, or cloud based solution such as MS Office Live 365.

A few current technologies:

Microsoft Windows 7
Microsoft Office 2010
Microsoft Office for Mac
Microsoft Server 2008 / R2
Microsoft Exchange Server 2010
Microsoft Small Business Server 2011
Microsoft SQL Server
Microsoft Dynamics
Microsoft Lync
Microsoft Remote Desktop Services (Terminal Services)
Microsoft Hypervisor

If you need to purchase one seat or one thousand seats through Microsoft licensing, we can help with that.

We are your Greenville / Upstate SC Microsoft sales, support and consultation solution provider!

Call us at 864.990.4748 or email us via the CONTACT form.

Happy Easter from all of us at Homeland Secure IT

Happy Easter from Homeland Secure IT & The Hoyts

Happy Easter (c)2012 John M. Hoyt

For those of you reading our blog in email, you are receiving this a day late and a dollar short, but the sentiment is the same.

The staff at Homeland Secure IT want to wish you a very happy Easter. We hope you were able to spend time with your family, and that you know that the real meaning behind Easter has nothing to do with bunnies, eggs, or candy.

Have a great week, for He has risen!

(The graphic is something we did a few years ago with real chocolate bunnies.  They were good if I remember correctly)

SECURE IT ALERT: Microsoft to unleash updates for April that address 4 critical vulnerabilities

Secure IT Alert for Thrusday, April 05, 2012

Coming your way right after Easter – Security updates from Microsoft!

This information is from the Microsoft Security Advance Notification for April 2012:

********************************************************************

Microsoft Security Bulletin Advance Notification for April 2012

Issued: April 5, 2012

********************************************************************

 

This is an advance notification of security bulletins that Microsoft is intending to release on April 10, 2012.

 

The full version of the Microsoft Security Bulletin Advance Notification for April 2012 can be found at http://technet.microsoft.com/security/bulletin/ms12-apr.

 

This bulletin advance notification will be replaced with the April bulletin summary on April 10, 2012. For more information about the bulletin advance notification service, see http://technet.microsoft.com/security/bulletin/advance.

 

To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications on http://technet.microsoft.com/security/dd252948.aspx.

 

Microsoft will host a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). Register for the Security Bulletin Webcast at http://technet.microsoft.com/security/bulletin.

 

Microsoft also provides information to help customers prioritize monthly security updates with any non-security, high-priority updates that are being released on the same day as the monthly security updates. Please see the section, Other Information.

 

This advance notification provides a number as the bulletin identifier, because the official Microsoft Security Bulletin numbers are not issued until release. The bulletin summary that replaces this advance notification will have the proper Microsoft Security Bulletin numbers (in the MSyy-xxx format) as the bulletin identifier. The security bulletins for this month are as follows, in order of severity:

 

 

Critical Security Bulletins

============================

 

Bulletin 1

 

– Affected Software:

– Windows XP Service Pack 3:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows XP Professional x64 Edition Service Pack 2:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows Server 2003 Service Pack 2:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows Server 2003 x64 Edition Service Pack 2:

– Internet Explorer 6

– Internet Explorer 7

– Internet Explorer 8

– Windows Server 2003 with SP2 for Itanium-based Systems:

– Internet Explorer 6

– Internet Explorer 7

– Windows Vista Service Pack 2:

– Internet Explorer 7

– Internet Explorer 8

– Internet Explorer 9

– Windows Vista x64 Edition Service Pack 2:

– Internet Explorer 7

– Internet Explorer 8

– Internet Explorer 9

– Windows Server 2008 for 32-bit Systems Service Pack 2:

– Internet Explorer 7

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 8

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 9

(Windows Server 2008 Server Core installation not affected)

– Windows Server 2008 for x64-based Systems Service Pack 2:

– Internet Explorer 7

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 8

(Windows Server 2008 Server Core installation not affected)

– Internet Explorer 9

(Windows Server 2008 Server Core installation not affected)

– Windows Server 2008 for Itanium-based Systems Service Pack 2:

– Internet Explorer 7

– Windows 7 for 32-bit Systems and

Windows 7 for 32-bit Systems Service Pack 1:

– Internet Explorer 8

– Internet Explorer 9

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1:

– Internet Explorer 8

– Internet Explorer 9

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

– Internet Explorer 8

(Windows Server 2008 R2 Server Core installation

not affected)

– Internet Explorer 9

(Windows Server 2008 R2 Server Core installation

not affected)

– Windows Server 2008 R2 for Itanium-based Systems and

Windows Server 2008 R2 for Itanium-based Systems

Service Pack 1:

– Internet Explorer 8

– Impact: Remote Code Execution

– Version Number: 1.0

 

Bulletin 2

 

– Affected Software:

– Windows XP Service Pack 3

– Windows XP Professional x64 Edition Service Pack 2

– Windows Server 2003 Service Pack 2

– Windows Server 2003 x64 Edition Service Pack 2

– Windows Server 2003 with SP2 for Itanium-based Systems

– Windows Vista Service Pack 2

– Windows Vista x64 Edition Service Pack 2

– Windows Server 2008 for 32-bit Systems Service Pack 2

(Windows Server 2008 Server Core installation affected)

– Windows Server 2008 for x64-based Systems Service Pack 2

(Windows Server 2008 Server Core installation affected)

– Windows Server 2008 for Itanium-based Systems Service Pack 2

– Windows 7 for 32-bit Systems and

Windows 7 for 32-bit Systems Service Pack 1

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1

(Windows Server 2008 R2 Server Core installation affected)

– Windows Server 2008 R2 for Itanium-based Systems and

Windows Server 2008 R2 for Itanium-based Systems

Service Pack 1

– Impact: Remote Code Execution

– Version Number: 1.0

 

Bulletin 3

 

– Affected Software:

– Windows XP Service Pack 3

– Windows XP Professional x64 Edition Service Pack 2

– Windows Server 2003 Service Pack 2

– Windows Server 2003 x64 Edition Service Pack 2

– Windows Server 2003 with SP2 for Itanium-based Systems

– Windows Vista Service Pack 2

– Windows Vista x64 Edition Service Pack 2

– Windows Server 2008 for 32-bit Systems Service Pack 2

– Windows Server 2008 for x64-based Systems Service Pack 2

– Windows Server 2008 for Itanium-based Systems Service Pack 2

– Windows 7 for 32-bit Systems and

Windows 7 for 32-bit Systems Service Pack 1

– Windows 7 for x64-based Systems and

Windows 7 for x64-based Systems Service Pack 1

– Windows Server 2008 R2 for x64-based Systems and

Windows Server 2008 R2 for x64-based Systems Service Pack 1

(Windows Server 2008 R2 Server Core installation affected)

– Windows Server 2008 R2 for Itanium-based Systems and

Windows Server 2008 R2 for Itanium-based Systems

Service Pack 1

– Impact: Remote Code Execution

– Version Number: 1.0

 

Bulletin 4

 

– Affected Software:

– Microsoft Office 2003 Service Pack 3

– Microsoft Office 2007 Service Pack 2

– Microsoft Office 2007 Service Pack 3

– Microsoft Office 2010 (32-bit editions)

– Microsoft Office 2010 Service Pack 1 (32-bit editions)

– Microsoft Office 2003 Web Components Service Pack 3

– Microsoft SQL Server 2000 Service Pack 4

– Microsoft SQL Server 2000 Analysis Services Service Pack 4

– Microsoft SQL Server 2005 for 32-bit Systems Service Pack 4

– Microsoft SQL Server 2005 for Itanium-based Systems

Service Pack 4

– Microsoft SQL Server 2005 for x64-based Systems Service Pack 4

– Microsoft SQL Server 2005 Express Edition with

Advanced Services Service Pack 4

– Microsoft SQL Server 2008 for 32-bit Systems Service Pack 2

– Microsoft SQL Server 2008 for 32-bit Systems Service Pack 3

– Microsoft SQL Server 2008 for x64-based Systems Service Pack 2

– Microsoft SQL Server 2008 for x64-based Systems Service Pack 3

– Microsoft SQL Server 2008 for Itanium-based Systems

Service Pack 2

– Microsoft SQL Server 2008 for Itanium-based Systems

Service Pack 3

– Microsoft SQL Server 2008 R2 for 32-bit Systems

– Microsoft SQL Server 2008 R2 for x64-based Systems

– Microsoft SQL Server 2008 R2 for Itanium-based Systems

– Microsoft BizTalk Server 2002 Service Pack 1

– Microsoft Commerce Server 2002 Service Pack 4

– Microsoft Commerce Server 2007 Service Pack 2

– Microsoft Commerce Server 2009

– Microsoft Commerce Server 2009 R2

– Microsoft Visual FoxPro 8.0 Service Pack 1

– Microsoft Visual FoxPro 9.0 Service Pack 2

– Visual Basic 6.0 Runtime

– Impact: Remote Code Execution

– Version Number: 1.0

 

 

Important Security Bulletins

============================

 

Bulletin 5

 

– Affected Software:

– Microsoft Forefront Unified Access Gateway 2010 Service Pack 1

– Microsoft Forefront Unified Access Gateway 2010 Service Pack 1

Update 1

– Impact: Information Disclosure

– Version Number: 1.0

 

Bulletin 6

 

– Affected Software:

– Microsoft Office 2007 Service Pack 2

– Microsoft Works 9

– Microsoft Works 6-9 File Converter

– Impact: Remote Code Execution

– Version Number: 1.0

 

 

Other Information

=================

 

Follow us on Twitter for the latest information and updates:

http://twitter.com/msftsecresponse

 

Microsoft Windows Malicious Software Removal Tool:

==================================================

Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center.

 

Non-Security Updates on MU, WU, and WSUS:

========================================================

For information about non-security releases on Windows Update and Microsoft update, please see:

* http://support.microsoft.com/kb/894199: Microsoft Knowledge Base

Article 894199, Description of Software Update Services and

Windows Server Update Services changes in content.

Includes all Windows content.

* http://technet.microsoft.com/en-us/wsus/bb456965.aspx: Updates

from Past Months for Windows Server Update Services. Displays all

new, revised, and rereleased updates for Microsoft products other

than Microsoft Windows.

 

Microsoft Active Protections Program (MAPP) ===========================================

To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed at http://www.microsoft.com/security/msrc/collaboration/mapp.aspx.

 

Recognize and avoid fraudulent email to Microsoft customers:

=============================================================

If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.

 

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at https://technet.microsoft.com/security/bulletin/pgp.

 

To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications on http://technet.microsoft.com/security/dd252948.aspx.

 

********************************************************************

THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

********************************************************************

To manage or cancel your subscription to this newsletter, visit the Microsoft.com Profile Center at <http://go.microsoft.com/fwlink/?LinkId=245953> and then click Manage Communications under My Subscriptions in the Quicklinks section.

 

For more information, see the Communications Preferences section of the Microsoft Online Privacy Statement at:

<http://go.microsoft.com/fwlink/?LinkId=92781>.

 

For the complete Microsoft Online Privacy Statement, see:

<http://go.microsoft.com/fwlink/?LinkId=81184>.

 

For legal Information, see:

<http://www.microsoft.com/info/legalinfo/default.mspx>.

 

This newsletter was sent by:

Microsoft Corporation

1 Microsoft Way

Redmond, Washington, USA

98052

If you require assistance with these or any other updates, please do not hesitate to call upon us at 864.990.4748.

 

SECURE IT ALERT: Update OS X Java to Avoid Spreading Mac Malware

Secure IT Alert for Thursday, April 05, 2012

This is courtesy of the WatchGuard Security Center.  We are happy to partner with WatchGuard to provide firewall and security solutions. Call us at 864.990.4748 if we can be of service!

 

Update OS X Java to Avoid Spreading Mac Malware

by Corey Nachreiner

Summary:

  • This vulnerability affects: OS X 10.7.x (Lion) and 10.6.x (Snow Leopard)
  • How an attacker exploits it: By enticing you to a website containing maliciously crafted Java
  • Impact: In the worst case, an attacker executes code on your user’s computer, with that user’s privileges
  • What to do: Install Java for OS X Lion 2012-001 or Java for OS X 10.6 Update 7 immediately, or let Apple’s updater do it for you.

Exposure:

Yesterday, Apple released an advisory describing a Java security update for OS X 10.6.x and 10.7.x. The update fixes 12 vulnerabilities in OS X’s Java components (number based on CVE-IDs).

Apple doesn’t describe each flaw in technical detail, but they do share the worst case impact. If an attacker can lure you to a website containing specially crafted Java code, he can exploit many of these vulnerabilities to execute code on your OS X computer, with your privileges.

This Apple update finally brings the Java updates Oracle released in February to OS X users. Unfortunately, attackers have already been exploiting one of these Java vulnerabilities against Mac users in the wild. A Mac trojan called Flashback has reportedly infected over 600,000 Macs, by leveraging one of these Java flaws (as well as a Flash vulnerability in the past). If you have any Mac computers in your organization, we highly recommend you install Apple’s OS X Java update immediately. You can also find instructions for checking your Mac for the Flashback malware here.

Solution Path:

Apple has issued Java for OS X Lion 2012-001 [dmg file] and Java for OS X 10.6 Update 7 [dmg file] to correct these flaws. If you manage OS X 10.6.x or 10.7.x computers, we recommend you download and deploy these updates immediately, or let OS X’s automatic Software Update utility install it for you.

For All WatchGuard Users:

Some of these attacks rely on one of your users visiting a web page containing malicious Java bytecode. The HTTP-Proxy policy that ships with most WatchGuard appliances automatically blocks Java bytecode by default, which somewhat mitigates the risk posed by some of these vulnerabilities.

Status:

Apple has released Java updates to fix these issues.

References:

This alert was researched and written by Corey Nachreiner, CISSP.

Homeland Secure IT Alert Footer

Homeland Secure IT Alert