March’s Patch Tuesday proved light on fixing vulnerabilities. That could be either good news or bad.
It does give us time to review past patches that gave some of us headaches — and others that need further testing. You’ll find a new summary chart at the bottom of this column.
Windows 7 Service Pack 1 is out. But does that mean you need to install it?
For those who just bought a brand-new PC, install it. For those who are running an existing Windows 7? You’ll need it, just not for several months.
Typically, the release of a first service pack marks an operating system’s coming of age.
But Windows 7 has proven a mature product from its first release — and doesn’t absolutely need this not-so-major update.
Internet Explorer brings us a digital Valentine in the form of a security update.
Install it on all the PCs you love. An unusual nonsecurity patch might mean we can kiss off malware that automatically runs on flash drives, too.
We may know that computing is rapidly ascending into the cloud, but do we know where we’re going and what the “cloud” is, exactly?
Once a simple euphemism for the World Wide Web’s infrastructure, cloud computing is rapidly becoming a complex virtual world where we work and play.
It seems like just yesterday that Microsoft released Windows 7; now we’re gearing up for its first service pack.
It seems a little surreal, but Microsoft is releasing an update that will prepare your PC for the really big update to Windows 7 Service Pack 1.
2011 is not getting off to a good start for Windows vulnerabilities — we’re starting the new year with more unpatched known vulnerabilities than ones we’re able to fix through updates.
Most of you will see just one official Patch Tuesday security update. But there are workarounds and mitigations you might need to consider.
It’s an all-too-common occurrence: As soon as Internet Explorer gets patched, another zero-day exploit is discovered.
If you’d like to give IE more protection from hackers, Microsoft has a little-known, free tool — EMET 2.0 — you should take a look at.
One measure of our success battling malware is the number of patches we’re asked to install each month. By that benchmark, we’re surely losing.
The patch count for December is a record for the year, with fixes for Internet Explorer, zero-day bugs, and DLL preloading threats. This might be end-of-year house cleaning, as most of the patches are not critical.
The security certificates provided by various companies are supposed to update automatically, but sometimes the process fails and creates a mess.
But botched updates can leave behind remnants of certificates that are a pain to remove. They also raise the question: Why do we need them?