Later today, Tuesday 14 January, Microsoft will be releasing its first bunch of scheduled security patches for 2014.
And the good news is that it’s – by normal standards – not too huge, making life that little bit less arduous for IT teams and system administrators around the world.
Oracle says that it is strongly recommending that customers apply the patches “as soon as possible” because of “the threat posed by a successful attack.”
Some of the malware spread over the New Year period via poisoned Yahoo ads was designed to mine the Bitcoin virtual currency.
One security company claims it stopped the attack days before it became public knowledge, but they didn’t tell anyone until now.
No tears will be lost if the authorities really do have the author of the Blackhole Exploit Kit in custody.
We’re still not safe with our computers, even with all the great improvements.
But – as Mikko Hypponen points out – at least we don’t see flights grounded and trains stopped by malware every other week, like we did in 2003.
Hundreds of thousands of Android apps are thought to contain the critical flaw, but when will you receive an operating system patch?
Java is getting a bad name for security, so it’s no surprise that more and more people are keen to permanently remove it off their computers rather than risk being hit by a malware attack.
Just last week you were congratulating yourself for patching your computer against a Java security hole.
Now another zero-day unpatched vulnerability has been found in Oracle’s widely used software.
Security researchers are gathering in Vancouver at the CanSecWest conference, in the hope of winning substantial cash prizes for finding exploitable vulnerabilities in the likes of Chrome, Internet Explorer and Java.
If you’re installing a critical security update on your computer, caused by the software vendor’s sloppy code quality, you probably wouldn’t dream that your software vendor is trying to make some money out of the inconvenience.