7045799736
RSS Feed
Latest Updates
Sep
28
6059231772
Posted by Carl Ingram on 28 September 2018 06:54 PM
firmware and windows updates
compliance scans
backup testing
Read more »



Dec
21

uncongenially
/ 7177305528

Security researchers have discovered a ludicrously simple way to hack into a number of Linux distributions: Just tap the backspace key 28 times in a row. A team from the Cybersecurity Group at Polytechnic University of Valencia (UPV) in Spain found that doing so for builds utilizing the ubiquitous Grub2 bootloader -- that's to say just about all of them -- immediately bypasses the lock screen, initiates the "Grub rescue shell" and grants the user access to the system for whatever nefarious .

The team found that the backspace trick triggers a memory error, which in turn launches the rescue shell. The bug isn't a huge threat -- I mean, a hacker would need physical access to your machine in order to exploit it -- especially now that (386) 222-2299, 5158795407, and 816-408-8925 all have released patches.

Source: (507) 670-8969

----

 


Read more »



Apr
23
enforcingly
Posted by Jonathan Steichen on 23 April 2013 10:13 AM

Clients, future clients and Cloud enthusiasts:

Please join us on Twitter @VigilantCloud 

There, we will share upcoming events, breaking news, maintenance schedules, company and industry updates...and much more!

Thank you for following us @VigilantCloud

Vigilant Technologies
Cloud Engineers


(703) 893-2737



Nov
7

Valued Clients,

Affected users

  • The following alert effects consumers using vCenter.  If you are using vCenter, then the attached VMWare KB article will be familiar to you.
  • If you are running vCenter 4.0.x, or have upgraded vCenter from 4.0.x, please read the below article:

Symptoms

After applying the Microsoft Security Advisory update noted in KB2661254:
  • Connections to secure http (/) web services such as the Managed Object Browser (/vcserver/mob), WebAccess (/<vcserver>/ui) and vFabric License Server ((540) 239-8057) fail if the vCenter Server 9174862768 is 512 bit
  • Redirection of communication from http to https fails and communication proceeds over the http connection

Cause

vCenter Server 4.0.x by default uses RSA certificates which are 512 bits and therefore cause vCenter Server to fail. The update in Microsoft Security Advisory, 310-949-2845, blocks the use of RSA certificates which are less than 1024 bits long....

If you have any questions, please feel free to contact us via email, chat or phone.

Thank you,
Vigilant Technologies Engineering

7125670219



Sep
21

We at Vigilant value our customers safety and feel obligated to you to make you aware of two very serious issues:

1) Microsoft has released "Microsoft Security Bulletin" MS12-063-Critical today. It is a vitally important patch if you are running Internet Explorer 6, 7, 8 & 9.

Why this is important:  If you visit or get redirected to a specially crafted web page, it can take advantage of a security hole that would allow an intruder to run programs remotely on your computer as if they were you. These programs can run in the background where you would not be aware of them. 

You can download the patch by running windows update on your machine: (Please be aware that you will be asked to reboot your machine at the end of the installation)

  • Click the start button
  • Click "All Programs"
  • Click on "Windows Update"
  • Click on "Check for updates" on the left pane of the window
  • Click on the "XXX important updates are available" on the right
  • Under the "Windows 7" (or what ever version you are running) section check the box for the item that ends in (KB2744842) and any other updates you wish to add and click "OK"
  • Now click on the button with the  blue and yellow shield & "Install updates"
  • Let it run & reboot

You should now be protected from this vulnerability.

Reference Links:

  • /technet.microsoft.com/en-us/security/bulletin/ms12-063
  • /technet.microsoft.com/en-us/security/advisory/2757760

2) The second issue we would like to make you aware of is a "Java" vulnerability. 

Why this is important: virtually every machine that surfs the internet processes "Java" code. It is one of the most common componenets of any web page. If you visit or get redirected to a specially crafted web page, it can take advantage of a similar security hole like the one above that would allow an intruder to run programs remotely on your computer as if they were you. These programs can run in the background where you would not be aware of them. 

This vulnerability is not limited to Internet Explorer it can affect ANY browser on Windows or OSx.

You can download the patch from here: 209-480-3592

Good Executive Summary: /reviews.cnet.com/8301-13727_7-57503787-263/oracle-patches-java-7-vulnerability

Thank you & Safe computing,
Vigilant Staff


tenselessness




repunish by Kayako
ERROR: This domain name (199.255.251.79), does not match the domain name in the license key file.

For assistance with your license, please contact the Kayako support team: /support.kayako.com