August 2017 News and Updates
Updates Executive Summary – In addition to the normal Microsoft, Adobe and Oracle / Java updates, Google released an update to patch 10 critical bugs in the Android operating system…
Read moreLoading
Updates Executive Summary – In addition to the normal Microsoft, Adobe and Oracle / Java updates, Google released an update to patch 10 critical bugs in the Android operating system…
Read moreUpdates Executive Summary – 2017 has been an explosive year for ransomware and a wake-up call for administrators of the importance of installing updates in a timely fashion. The WannaCry…
Read moreCyber Tech Cafe will be closed on Tuesday, 4 July 2017 in observance of Independence Day to enjoy time with family, friends and loved ones. We will reopen on Wednesday,…
Read moreA poorly or unsecured Amazon Web Services server was the cause for what is being touted as the “largest ever known exposure of voter information to date.” The data was…
Read moreI’m excited to announce the official launch of the new Cyber Tech Cafe website. I expect that we’ll be making some tweaks and changes over the coming days and weeks…
Read more[UPDATE] February Monthly Updates [UPDATE] Microsoft has officially announced that February’s updates will be released next month as part of the March regularly scheduled updates. https://blogs.technet.microsoft.com/msrc/2017/02/14/february-2017-security-update-release/ We…
Read moreUpdates Executive Summary – For the first time that I can remember, Microsoft has delayed the monthly updates for February 2017 because of a last minute problem that was…
Read moreUpdates Executive Summary – 2017 is starting out with a relatively low number of updates with only four bulletins from Microsoft (Edge, Office and Windows [LSA]) and two updates…
Read moreCyber Tech Cafe will be closed on Monday, 26 December 2016 to enjoy Christmas and to spend time with family, friends and loved ones. We will re-open on Tuesday, 27…
Read moreUpdates Executive Summary – Microsoft released a total of 12 bulletins, half of which are rated critical and most of those can allow an attacker full access to a…
Read more