Microsoft’s Patch Tuesday Packed with Critical RCE Bugs
The most concerning of the disclosed bugs would allow an attacker to take over Microsoft Exchange just by sending an email.
The most concerning of the disclosed bugs would allow an attacker to take over Microsoft Exchange just by sending an email.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Coronavirus in Context is a weekly newsletter where we bring you facts that matter about the COVID-19 pandemic and the technology trying to stop its spread. You can subscribe here. Hi-diddly-ho corona-rinos, Nobody talks about the 8 billion people who haven’t died from COVID-19 amirite? This week’s newsletter is dedicated to everyone who hates how biased the mainstream…
As part of this month’s Patch Tuesday, Microsoft today released a fresh batch of security updates to fix a total of 129 newly discovered security vulnerabilities affecting various versions of its Windows operating systems and related software. Of the 129 bugs spanning its various products — Microsoft Windows, Edge browser, Internet Explorer, ChakraCore, SQL Server,…
This is a bit warped Just as the Hubble Space Telescope was starting its mission at the beginning of the 1990’s, adaptive optics were developed — a technology that removes much of the image wavering caused by the atmosphere, using a small, deformable mirror. Distortions from a point of light (like a star) are measured, and the…
Cybersecurity agencies across Asia and Europe have issued multiple security alerts regarding the resurgence of email-based Emotet malware attacks targeting businesses in France, Japan, and New Zealand. “The emails contain malicious attachments or links that the receiver is encouraged to download,” New Zealand’s Computer Emergency Response Team (CERT) said. “These links and attachments may look…
Did you know Ingrid Ødegaard is speaking at TNW2020 this year? Check out their session on ‘How to compete with tech giants’ here. As a distributed team, employees at Whereby are encouraged to explore opportunities to connect with individuals both inside and outside of the company. Recently, a few members of our support team participated in a mentoring…
As IT systems, IoT and operational technology converge, attacks on cyber-physical systems in industrial, healthcare and other scenarios will come with dire consequences, Gartner predicts.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Ken Block and exuberant driving go together like coffee and cream, cheese and wine, or Jack and coke. Usually his flamboyant gymkhana runs feature the soundtrack from a crazy powerful combustion engine that sings a roaring overture as he threads his way round a racetrack with pinpoint precision. Times are changing, and the days of…
The SASE model for remote access and security coupled with Zero Trust can help redefine network and perimeter defenses when a traditional “perimeter” no longer exists.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Scientists have completed the first-ever demonstration of a “plug and play” brain prosthesis controlled by a paralyzed person. The system uses machine learning to help the individual control a computer interface with just their brain. Unlike most brain-computer interfaces (BCI), the AI worked without requiring extensive daily retraining. Study senior author Karunesh Ganguly, an associate professor in the UC San…