Archive for the 'Stay Secure' Category

Mac OS X 10.6.3 update

Monday, March 29th, 2010

Apple has released Mac OS X 10.6.3 update, and it's a massive 760MB, plugging up 88 vulnerabilities. Here's what it contains: Full changelog for Mac OS X 10.6.3 update: General operating system fixes and improvements provided for: * performance of Logic Pro 9 and Main Stage 2 when running in 64-bit mode.* printing reliability.* sleep […]

“Password” in any other language is still a poor password!

Wednesday, March 24th, 2010

Top 20 list of the most commonly used passwords as disclosed by a breach of Älypää, a popular Finnish game and quiz site: The word "salasana" is Finnish for "password" ... (via F-Secure blog)  

XP BSoDs may be down to malware

Saturday, February 13th, 2010

If you're encountering BSoDs and reboots on your XP machines following the installation of this month's load of Patch Tuesday updates, your machine might be infected with malware. Patrick W. Barnes, a systems administrator at Cat-man-du, a technology services firm in Amarillo, Texas, said at least three different customers came into his shop with the same blue screen […]

Microsoft outlines risks of downloading dodgy software

Thursday, February 11th, 2010

What could possibly go wrong? So, what are the risks of activation exploits? Searching for, downloading, or installing activation exploits or counterfeit software on the Internet is risky, because sites that advertise these pirated products often contain malware, viruses, and Trojans, which are found bundled with or directly built into the activation exploit or counterfeit […]

Good advice on Patch Tuesday installation schedule

Thursday, February 11th, 2010

Over on Sunbelt Software's blog, Research Center Manager Tom Kelchner offers some sound advice on how to schedule the installation of patches: Possibly a good strategy would be phased updates especially for enterprise systems: -- Immediately install just the patches that fix vulnerabilities with in-the-wild exploits if you are running the vulnerable applications, modules, plug-ins, […]