The Last Windows XP Security White Paper
Using the strategies and procedures we present in our paper could help prevent an attacker from taking control of your computer
Browsing category
Using the strategies and procedures we present in our paper could help prevent an attacker from taking control of your computer
Three years ago, Microsoft ended its extended support for Windows XP. Today, almost 8% of desktop users worldwide are still run the operating system.
With analysts predicting a big shift to Windows 10 in the enterprise in 2017, a new ESET white paper looks at security and privacy changes in Windows 10 Anniversary Update, the build that Microsoft expects its business customers to run on the majority of their desktop computers.
We are pleased to present our annual report Windows exploitation in 2016. In this latest version of our report, we offer a fresh look at modern security features in Windows 10.
Despite the fact that there haven’t been any security updates or patches rolled out for Windows XP – with some industrial solutions being the exception – the system still runs on almost every tenth computer worldwide.
Hacking Team exploits and new security features in Google Chrome and Microsoft Edge are just a few of the highlights of ESET’s annual Windows exploitation in 2015 report.
Microsoft is set to introduce a new update system for Windows 10 that will effectively do away with Patch Tuesday.
One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
The end of mainstream support for Windows: Don’t repeat the mistakes of the past, and be prepared. Especially if you’ve only just got rid of all the Windows XP computers in your company.
Microsoft is changing the way it distributes its Advance Notification Service, and will no longer make the security bulletins publicly available, according to eWeek.
Today, we published our research about Windows exploitation in 2014. This report contains interesting information about vulnerabilities in Microsoft Windows and Office patched over the course of the year, drive-by download attacks and mitigation techniques.
Firefox 34, the latest version of the Mozilla’s popular web browser has disabled support for SSL 3.0 in reaction to the POODLE exploit, reported by We Live Security back in October.
For computer hackers, making the classic first-person shooter Doom play on odd devices is a quest that never ends – but an Australian team may have won the game for good, by running Doom on an ATM.
Microsoft rushed out an emergency security fix for Internet Explorer, to fix a flaw which hackers had already exploited – affecting IE versions 6 to 11 on several versions of Windows.
Windows XP comes to an end of sorts on April 8, 2014. After this, Microsoft will cease providing security updates or support for this venerable operating system. ESET discusses implications and resources.
The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.
A new white paper, titled Windows 8.1 Security – New and Improved, looks at the some of the most anticipated—and controversial—security features of this new “.1” point release of Windows 8.
The upcoming 8.1 update to Windows 8 will offer improved fingerprint security – including the option to secure folders using a fingertip, as well as signing into Microsoft accounts and authenticating online payments.
Win32/Gapz’s new bootkit technique modifies just 4 bytes of the original VBR, has an enhanced dropper and complex kernel mode functionality, and evades ELAM.
Win32/Gapz has a new technique for code injection and a new VBR infection method. The dropper has many tricks for bypassing detection by security software.
Disasters, new hardware, new software: to the phish scammer, it’s all potential bait for reeling in victims.