Tick cyberespionage group zeros in on Japan
Written by Apr 28, 2016, 8:53 am
No Comment • Related Topics: General
summary
Contributor: Gavin O’Gorman
Source: Symantec
What you need to know about election apps and your personal data
Written by Apr 25, 2016, 8:58 am
No Comment • Related Topics: General
summary
Contributor: Shaun Aimoto
Source: Symantec
TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
Written by Apr 14, 2016, 3:48 pm
No Comment • Related Topics: General
Original release date: April 14, 2016
Systems Affected
Microsoft Windows with Apple QuickTime installed
Overview
According to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. [1]
Description
All software products have a lifecycle. Apple will no longer be providing security updates for QuickTime for Windows. [1]
The Zero Day Initiative has issued advisories for two vulnerabilities found in QuickTime for Windows. [2] [3]
Impact
Computer systems running unsupported software are exposed to elevated cybersecurity dangers, such as increased risks of malicious attacks or electronic data loss. Exploitation of QuickTime for Windows vulnerabilities could allow remote attackers to take control of affected systems.
Solution
Computers running QuickTime for Windows will continue to work after support ends. However, using unsupported software may increase the risks from viruses and other security threats. Potential negative consequences include loss of confidentiality, integrity, or availability of data, as well as damage to system resources or business assets. The only mitigation available is to uninstall QuickTime for Windows. Users can find instructions for uninstalling QuickTime for Windows on the Apple Uninstall QuickTime page. [4]
References
- [1] Trend Micro – Urgent Call to Action: Uninstall QuickTime for Windows Today
- [2] Zero Day Initiative Advisory ZDI 16-241: (0Day) Apple QuickTime moov Atom Heap Corruption Remote Code Execution Vulnerabilit
- [3] Zero Day Initiative Advisory ZDI 16-242: (0Day) Apple QuickTime Atom Processing Heap Corruption Remote Code Execution Vulner
- [4] Apple – Uninstall QuickTime 7 for Windows
Revision History
- April 14, 2016: Initial Release
This product is provided subject to this Notification and this Privacy & Use policy.
Source: CERT
Microsoft Patch Tuesday – April 2016
Written by Apr 12, 2016, 2:33 pm
No Comment • Related Topics: General
summary
Hello, welcome to this month’s blog on the Microsoft patch release. This month the vendor is releasing 13 bulletins, six of which are rated Critical.
Source: Symantec
New Adobe Flash Player exploit used by Magnitude and Nuclear exploit kits
Written by Apr 12, 2016, 10:18 am
No Comment • Related Topics: General
summary
Source: Symantec
Latest Intelligence for March 2016
Written by Apr 8, 2016, 8:58 am
No Comment • Related Topics: General
summary
Source: Symantec
New Flash zero-day exploited by attackers in the wild
Written by Apr 6, 2016, 11:19 am
No Comment • Related Topics: General
summary
Adobe has said it will soon issue an update for Flash Player, following the discovery of a critical vulnerability that is being exploited in the wild.
Source: Symantec
Samsam may signal a new trend of targeted ransomware
Written by Apr 5, 2016, 4:11 pm
No Comment • Related Topics: General
summary
Source: Symantec
Four tax scams to watch out for this tax season
Written by Apr 5, 2016, 8:58 am
No Comment • Related Topics: General
summary
Source: Symantec