Archive for the 'Stay Secure' Category

Finally fixed the dreaded “You do not have sufficient permissions to access this page” WordPress upgrade problem!

Friday, December 10th, 2010

I like WordPress, and I hate hackers, so I like to keep WordPress up-to-date. To make this easier there's an automatic update mechanism baked right into the application turning a tedious process into a one-click job. But for some time now I've not been able to use this feature because it was broken. Each time […]

88 ‘High Risk’ vulnerabilities discovered in Android 2.2 ‘Froyo’

Thursday, November 4th, 2010

Worrying for Android users: Security researchers at Coverity examined some 61 million lines of code from 291 open source projects and compared the results to those for the Android kernel. The researchers picked up on 359 bugs in the Android 2.2 source code, some 25% of which were ranked as ‘high risk’ vulnerabilities that could […]

Microsoft pushes “out of band” update for .LNK vulnerability

Tuesday, August 3rd, 2010

From the Microsoft Security Research Center blog: We are releasing the bulletin as we’ve completed the required testing and the update has achieved the appropriate quality bar for broad distribution to customers. Additionally, we’re able to confirm that, in the past few days, we’ve seen an increase in attempts to exploit the vulnerability. We firmly […]

Get Safe Online – Warnings

Wednesday, March 31st, 2010

There are new security warning(s): ·         Microsoft Internet Explorer Vulnerabilities What does it affect?: Windows 95, Windows 98, Windows 2000, Windows XP, Windows Vista What does it do?: Microsoft has released an update to its Security Bulletin Summary for March 2010 and has included the out-of-band bulletin MS10-018. This bulletin addresses ten vulnerabilities in Internet […]

Watch out! Scammers about!

Tuesday, March 30th, 2010

IRS tax phishing scams on the increase ... so be careful out there! Researchers at McAfee Labs continuously monitor threats to best protect our customers. We have identified a cluster of fake IRS URLs. Victims might visit these phishing and malicious websites via any number of effective redirection methods: phishing attacks, forum postings, and black-hat […]