Microsoft is set to introduce a new update system for Windows 10 that will effectively do away with Patch Tuesday.
One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for consumer and enterprise versions.
Its been just under three weeks since February 19th, when Lenovo became entangled in a web of controversy over its preinstallation of Superfish’s Visual Search adware on some of its popular consumer laptops during last year’s holiday shopping season.
The end of mainstream support for Windows: Don’t repeat the mistakes of the past, and be prepared. Especially if you’ve only just got rid of all the Windows XP computers in your company.
Microsoft is changing the way it distributes its Advance Notification Service, and will no longer make the security bulletins publicly available, according to eWeek.
Firefox 34, the latest version of the Mozilla’s popular web browser has disabled support for SSL 3.0 in reaction to the POODLE exploit, reported by We Live Security back in October.
For computer hackers, making the classic first-person shooter Doom play on odd devices is a quest that never ends – but an Australian team may have won the game for good, by running Doom on an ATM.
Microsoft rushed out an emergency security fix for Internet Explorer, to fix a flaw which hackers had already exploited – affecting IE versions 6 to 11 on several versions of Windows.
Microsoft announces a zero-day security flaw in many versions of Internet Explorer, the first to hit Windows users since XP support was terminated on April 8, potentially crippling IE on XP systems.
Microsoft will cease providing security updates for the Windows XP operating system on April 8, 2014. If you cannot get away from Windows XP yet, there are still a few things you can do to keep yourself safe.
The year 2013 was notable for the appearance of 0-day vulnerabilities that were primarily used in targeted attacks. In this case, criminal hackers worked on developing exploits, only not for random propagation of malicious code, but rather for use in attacks on specific users.