Great article from ZDNet with details on curing the Adobe security vulnerability on your PC. The options are to make Flash selectively run on your command or install completely. Keep in mind that a full uninstall will be your best protection option; but there are some times that you may still need to use Flash.
Microsoft stepping up the concern for security here. Users should take note and use this formula as a best practice and apply to all passwords used especially Banking, Credit and Finance-related sites.
Microsoft is banning weak and common passwords from Microsoft Account and Azure AD system and implementing a feature called smart password lockout.
With the recent focus on Apple in Apple versus government encryption battle, one has to ask “What if this were an Android device…?”
Check out @TechRepublic’s Tweet: https://twitter.com/TechRepublic/status/726025778668933120?s=09
Check out @MySQL’s Tweet: https://twitter.com/MySQL/status/725243609360961536?s=09
MySQL rolls out Transparent Data Encryption as a feature.
Using an Android phone exposes a user to potential security vulnerabilities. Remember each vendor and wireless network carrier modified the operating system on your phone. Security updates do not always happen automatically.
If your a Windows user, there is another hole in the web that you need to guard against. Apple is no longer issuing updates to QuickTime on the Microsoft platform. This coupled along with the that the Department Homeland Security has reported potential flaws should definitely throw up a red flag.
The recommended best practice in this case is to remove/uninstall Apple QuickTime from your PC at your earliest convenience. After doing so, it is highly recommended to update all other software including all anti-virus products. Regular system updates should also be made.
Source: The Verge
Mozilla has issued an update for Firefox to fix a vulnerability in the browser that once again can allow an attacker to compromise a users system and allow third parties to search for sensitive files on a local system. The attacker can upload the information without ever gaining control of the actual system.
As is usual in these cases, Firefox users are recommended to update their browser to version 39.0.3 or above as soon as possible.
For the full Mozilla security bulletin, please refer to : https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
The Rapid7 security group has identified an exploit that takes advantage of vulnerabilities in the default Android browser found on most Android based phones and tablets.
It is highly recommended that if your device is Android 4.1 or lower, you should use an alternate Browser from the Google Play Store and disable the built-in browser. id browser found in devices with Android operating systems of 4.10 and older. Google has reportedly fixed this bug starting with Android version 4.2 and above. However, the older versions of Android have no update capability to patch for these exploits.
Full Details can be found at Net-Security.org