Mostrando entradas con la etiqueta security. Mostrar todas las entradas
Mostrando entradas con la etiqueta security. Mostrar todas las entradas

lunes, agosto 10, 2015

Windows 10, google, android, grave problema de seguridad para usuarios

Por el amor de Dios, has visto la de cosas que windows 10 quiere que compartas con ellos, practicamente todo lo que escribes, dibujas o recibe tu microfono.

http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html

Y google que ahora almacena todos tus movimientos de tu mobil android?

http://www.hongkiat.com/blog/essential-google-urls/

Y android, que ahora guarda todo " en la nube" si le das a hacer backup.

Qué podría ir mal!?? quizas que compartas toda tu informacion por equivocación al cambiar algun settings?.

domingo, febrero 16, 2014

Security Updates for Shockwave, Windows

Adobe and Microsoft today each issued patches to fix critical security flaws in their software. Microsoft’s February Patch Tuesday includes seven patch bundles addressing at least 31 vulnerabilities in Windows and related software. Adobe pushed out an update that fixes two critical bugs in its Shockwave Player.
More than half of the updates issued by Microsoft today earned a “critical” rating — Microsoft’s most dire. That rating is assigned to vulnerabilities that can be exploited by malware or malcontents to take complete, remote control over vulnerable systems — with no help from users.

To harden even more your computer we recomend activate windows security extended mitigation for your windows programs along with your antivirus and firewall.


viernes, octubre 24, 2008

Nueva vulnerabilidad de windows 0-day afecta si tienes archivos compartidos en red

Alerts

MS Windows Wormable Vulnerability, Out-of-Band Patch Released (MS08-067)

Date:10.23.2008

Threat Type: Malicious Web Site / Malicious Code

Websense® Security Labs™ has received reports of exploits circulating in the wild that take advantage of a serious Windows vulnerability. Microsoft just released an out-of-band patch to address this just hours ago (see MS08-067).

The remote code execution vulnerability is found in netapi32.dll, and carries a severity rating of "Critical" by Microsoft, affecting even fully patched Windows machines. This vulnerability (CVE-2008-4250) allows malicious hackers to write a worm (self-propagating malicious code without need for any user interaction), by crafting a special RPC request. A successful exploitation would result in the complete control of victim machine.

To date, we have seen attacks installing a Trojan (Gimmiv) upon successful exploitation. At the time of this alert, only 25% of 36 anti-virus vendors could detect this malicious code. Blocking TCP ports 139 and 445 at the firewall is only a partial solution because most desktops have file/printer sharing turned on. The out-of-band patch release by Microsoft testifies to the severity of this vulnerability and the urgency for an immediate fix.