4022345 - Identifying and correcting failure of Windows Update client to receive upda...
Severity Rating: Critical
Revision Note: V1.3 (May 12, 2017): Updated FAQ to clarify the update that needs to be installed: “the current cumulative update”. This is an informational change only.
Summary: Microsoft is releasing this security advisory to provide information related to an uncommon deployment scenario in which the Windows Update Client may not properly scan for, or download, updates.
Revision Note: V1.1 (May 10, 2017): Advisory revised to include a table of issue CVEs and their descriptions. This is an informational change only.
Summary: Microsoft is releasing this security advisory to provide information about vulnerabilities in the public .NET Core and ASP.NET Core. This advisory also provides guidance on what developers can do to update their applications correctly.
Revision Note: V1.0 (May 9, 2017): Advisory published.
Summary: Beginning May 9, 2017, Microsoft released updates to Microsoft Edge and Internet Explorer 11 to block sites that are protected with a SHA-1 certificate from loading and displays an invalid certificate warning. This change will only impact SHA-1 certificates that chain to a Microsoft Trusted Root CA where the end-entity certificate or the issuing intermediate uses SHA-1. Manually-installed enterprise or self-signed SHA-1 certificates will not be impacted, although we recommend that all customers quickly migrate to SHA-2. For more information, please see Windows Enforcement of SHA1 Certificates.
If the Guardians of the Galaxy Were Hackers…
Earlier this month, Guardians of the Galaxy, Vol. 2 took box offices by storm. Arguably the best part about this franchise is the unique characters. The new film features audience favorites from the original and newcomers – each with their own exceptional set of characteristics and skills. In his latest column on GeekWire, WatchGuard CTO, Corey Nachreiner draws some fun and […]
Read More - If the Guardians of the Galaxy Were Hackers…Once Stolen, What Do Hackers Do With Your Data?
It’s a common question: What happens to your data after a hacker steals it? Understanding the nuts and bolts of an attacker’s post-hack routine is not only interesting, but it could also help you minimize the damage if your data is stolen. (Note that the following information is a general overview of the most common steps […]
Read More - Once Stolen, What Do Hackers Do With Your Data?Lessons From Tinder On Using Word-of-Mouth Marketing in Social Media
Whatever your feelings regarding online dating, it’s hard to deny that Tinder is a master at word-of-mouth digital marketing. The dating app grew from 20,000 to 500,000 users in less than a month and had more than one million paying subscribers and over 50 million total users by the end of 2016. Social media was […]