- Security Center
- English ▾
- Contact Us
Adobe have published details of a critical vulnerability the following applications.
Adobe Flash Player 10.1.85.3 and earlier versions
Adobe Reader 9.4 and earlier 9.x versions
Adobe Acrobat 9.4 and earlier 9.x versions
The vulnerability could cause a crash and potentially allow an attacker to take control of the affected system.
Mozilla have published an update for their Firefox browser that fixes a critical security issue that could potentially allow remote code execution.
Users are strongly recommended to update to the latest version. To update manually, select 'Check for Updates' from the Help menu then clicking on "CHeck for Updates"
More information about the updates is available here.
Fast turnaround on the fix, Mozilla - well done.
From the Mozilla blog:
Mozilla is aware of a critical vulnerability affecting Firefox 3.5 and Firefox 3.6 users. We have received reports from several security research firms that exploit code leveraging this vulnerability has been detected in the wild.
As stated by Help Net Security a new Firefox plugin, "Firesheep", can be used for "sniffing" HTTP sessions that are unencrypted. The plugin can be used for hijacking online services, such as social networks - and other online services that require a login. The Firesheep plugin makes it thereby possible for perpetrators to impersonate users by simply hijacking their sessions at services such as Facebook, WordPress,Twitter, Google, Flickr, Amazon.com etc.
Windows is an attractive platform for the malware writers, in part, because of the sheer number of users. As Microsoft creep towards making their offerings more secure, applications are increasingly becoming the focus for vulnerability exploitation.
Like Windows, Adobe products are a default software choice for most users. The bad guys know this and realise that its profitable to scrutinise their applications for exploitable vulnerabilities and create malware to take advantage of the fact.
Firefox 3.6.11 and Thunderbird 3.15 have been released which include security updates for several critical vulnerabilities that can be exploited to run malicious code. Users are advised to update these applications.
Full details about the updates here:
Its a good idea to set these applications to check for updates automatically.
In a recent article by CBC News more security and privacy concerns for companies, and possibly individuals, have been highlighted.
The problem centers around your disused photocopier. Since modern photocopiers contain hard drives for storing the information they scan this information is available long after you have forgotten all about it.
RealNetworks, Inc. have published product upgrades addressing vulnerabilities in RealPlayer SP 1.1.4 and earlier.
The vulnerabilities may allow an attacker to execute arbitrary code.
Windows users of RealPlayer SP 1.1.4 and earlier are advised to upgrade to the latest version here
For more information, visit RealNetworks' security advisory here
So, you’ve just bought a new PC or installed a fresh version of Windows. The simple fact is it's not as secure as it could be.
It doesn’t take much to tighten up your PC’s defenses - even if your computer has been up and running for a while, it’s not too late to carry out a security audit on your machine.
You probably wouldn’t leave your house without checking the windows are closed and the doors are locked. Why would you do that? Well, to stop someone breaking in and stealing your stuff or to prevent people just walking in and spray painting the walls.
Today’s rogues have many ways of trying to trick user to install them. Recently we discovered a page that was offering free books for download.
- 1 of 2