Patching stories
Desktops, laptops, and smartphones running on vulnerable processors can be exposed to unauthorized access and information theft.
Specifically, the partnership will see NinjaRMM integrate Ivanti patch management technology into its RMM platform.
The recent release of the Australian Cyber Security Centre (ACSC) 2017 report revealed a small breach – with massive implications.
The Greater Manchester police have revealed more than one in five of its computers are still running an OS that has been unsupported since 2014.
Equifax breach reveals well-known vulnerability, patch available long before attack, says Flexera. More hacks likely to come.
ICS attacks could shut down critical operational systems, damage or destroy physical equipment and threaten human safety.
Cisco's ANZ security chief unveils the perilous cyber threats menacing healthcare, stressing the urgent need for robust digital defences.
Information security can be a noisy place. As a career security guy my experiences have given me a deep understanding of attackers & the enterprise.
CyberArk Labs researchers made the proof-of-concept last week, saying that GhostHook could be a major threat once attackers have control of devices.
Welcome to the post-WannaCryptor world, where every computer user understands the importance of creating secure backups and applying security patches.
Serious vulnerabilities in SAP systems worldwide put businesses at risk of data theft and disruption, discovered by ERP-SEC.
While there has been a flurry of activity in releasing security patches, many of those patches are not being applied.
Firefox has disabled all NPAPI plugin capability except Flash. Common plugins such as Adobe Acrobat, Java and Microsoft Silverlight no longer load.
The average private user has 63 programs on their PC from 21 different vendors. 7% of those are at the end of their life, meaning they're not patched.
Memory corruption bug in Windows OS can cause DoS attack and remote code execution, with no current solution available.
The art of patching is becoming increasingly critical with the rise of the IoT - is it possible to avoid downtime?.
Check Point Software introduces new security gateway for Industrial Control Systems; aims to prevent cyber attacks on critical infrastructure.
With the new patch 1.75 installed Sony's PlayStation 4 finally becomes a fully-fledged Blu-ray player capable of playing Blu-ray 3D movies.
Ivanti talk about the upcoming ramifications of the Notifiable Data Breaches act, and the simple things you can do to prepare.
The average private user has 77 programs on their PC and 7.1% of those are at the end of their life (EOL) and no longer patched by the vendor.