Oracle has released security updates to Java. If you must use Java it is highly recommended that you install this latest update. Use the Offline download where possible to avoid the prompter asking to install the Ask toolbar. Consider disabling Java in your browser. If you don’t use Java but have it installed it should be … Read More
Check you have the latest security updates
Given the ongoing cat and mouse game between software developers and malicious hackers it is important to ensure that the latest security updates are running on your computer. Below are links which detail how to check you have the latest updates for Microsoft Windows 7, Apple OSX and Java. Microsoft Windows 7 Apple OSX Java
Java Security Update 7u17
Oracle has released the latest security updates to Java. If you must use Java it is highly recommended that you install this latest update. Use the Offline download where possible to avoid the prompter asking to install the Ask toolbar. Consider disabling Java in your browser. If you don’t use Java but have it installed … Read More
Java Security Update
Oracle has released the latest security updates to Java. If you must use Java it is highly recommended that you install this latest update. Use the Offline download where possible to avoid the prompter asking to install the Ask toolbar. Consider disabling Java in your browser. If you don’t use Java but have it installed … Read More
UPnP Security Vulnerability
A security flaw has been discovered in some routers in the implementation of UPnP. While the business grade routers in most organisations won’t be vulnerable, consideration needs to be given to the home routers of employees that use VPN or other means to access the corporate network. An exploit against a home router could lead … Read More
Three Basic Rules For Internet Security
Brian Krebs is a journalist respected for his accessible writing on the subject of Internet security. Much of his knowledge of the subject comes from the time he spends on the darker side of the internet observing the changing strategies and psychology of the malware makers. In this article he describes his three basic rules … Read More