<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Application Updates Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/application-updates/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/application-updates/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Thu, 06 May 2021 16:03:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Application Updates Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/application-updates/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Urgent Security Patch for Hundreds of Millions of Dell Computers</title>
		<link>https://fosterinstitute.com/urgent-security-patch-for-hundreds-of-millions-of-dell-computers/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 06 May 2021 15:43:21 +0000</pubDate>
				<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=4656</guid>

					<description><![CDATA[<p>Your IT Team has an opportunity to patch a security weakness in your Dell computers. If you facilitate them acting now, you will probably be one step ahead of attackers. The good news is Dell&#8217;s not detected any attacks in the wild. However, now bad actors have a new challenge, a puzzle to solve, a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/urgent-security-patch-for-hundreds-of-millions-of-dell-computers/">Urgent Security Patch for Hundreds of Millions of Dell Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Your IT Team has an opportunity to patch a security weakness in your Dell computers. If you facilitate them acting now, you will probably be one step ahead of attackers.</p>



<p>The good news is Dell&#8217;s not detected any attacks in the wild. However, now bad actors have a new challenge, a puzzle to solve, a game with payoffs for them, and potential tragedy for their targets. Dell urges companies to install the update immediately.</p>



<p>Executives decide whether to accept the risk or provide teams with time to implement the two-step solution from Dell.</p>



<p>To exploit the security weakness, bad actors might effectively social engineer at least one user to click on a malicious link, open an infected attachment, or grant access to someone pretending to be a technical support professional.</p>



<p>Alternatively, the attacker can steal or guess the user&#8217;s password. For example, we are auditing a business right now and discovered the following passwords: Password, Password!, Password1, and Password123. Users choosing those passwords is NOT the IT professional&#8217;s fault.</p>



<p>Please forward this to your associates so they know that Dell is urging all affected customers to address this problem immediately.</p>



<p>Time is your team&#8217;s most precious asset, and this fix takes time. Discuss ways they can postpone other projects to address the problem before attackers start exploiting the vulnerability to potentially:</p>



<ul class="wp-block-list"><li>Shut down systems</li><li>Spread ransomware</li><li>Threaten to expose stolen data</li><li>Delete your data stored in the cloud or on your servers</li><li>Or otherwise devastate organizations</li></ul>



<p>Dell recommends acting immediately: <a href="http://dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability" target="_blank" rel="noreferrer noopener">dell.com/support/kbdoc/en-us/000186019/dsa-2021-088-dell-client-platform-security-update-for-dell-driver-insufficient-access-control-vulnerability</a></p>



<p>During the recent Pwn2own competition, a team demonstrated exploiting Exchange servers. With the new knowledge, attackers infiltrated servers before IT Professionals could apply patches. The Dell vulnerability could have the same outcome. Keep in mind that there are vastly more Dell computers in businesses than there are on-prem Exchange servers.</p>



<p>Interestingly, the vulnerability only exists if the IT Team is applying Dell&#8217;s patches and updates. However, if your team is not using Dell&#8217;s other security updates, that is a problem too. They might not have enough time and need your understanding when they need to reprioritize their tasks, have additional help, or automate some processes they must do manually.</p>
<p>The post <a href="https://fosterinstitute.com/urgent-security-patch-for-hundreds-of-millions-of-dell-computers/">Urgent Security Patch for Hundreds of Millions of Dell Computers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>1 Million Android User Accounts Reported Hacked</title>
		<link>https://fosterinstitute.com/1-million-android-user-accounts-reported-hacked/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Dec 2016 17:32:02 +0000</pubDate>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Infected Apps]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Patch Release]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Tips]]></category>
		<category><![CDATA[Android Hacked]]></category>
		<category><![CDATA[Android Phones]]></category>
		<category><![CDATA[App Security]]></category>
		<category><![CDATA[blackberry]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[Google Accounts Hacked]]></category>
		<category><![CDATA[Gooligan Code]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Malicious Apps]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2401</guid>

					<description><![CDATA[<p>It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take over the phone, they can then gain access to the user&#8217;s Google accounts. Often [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/1-million-android-user-accounts-reported-hacked/">1 Million Android User Accounts Reported Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It was reported yesterday that malicious apps running on Android phones has resulted in 1 million Google user accounts being hacked. Check Point Software Technologies estimates that 75% of Android phones are still vulnerable to this attack. Once the attackers take over the phone, they can then gain access to the user&#8217;s Google accounts. Often the best way to steal data from a mobile device is <span id="more-2401"></span>to simply steal data and images stored in a user&#8217;s account. That applies to all brands, not just Android.</p>
<p>A big problem is that security patches that protect against these kinds of breaches never reach users&#8217; Android devices because of something known as Android fragmentation. When Google releases security patches, the patches are sent to device manufacturers, who are then responsible for releasing the patches for their different models. Some do not release the patches, or do so after a long delay.</p>
<p>Google is taking steps to help mitigate the problem, such as scanning phones and apps to look for Gooligan code and forcing resets of credentials to Google accounts. But so far that hasn&#8217;t been enough to protect those million users that have had their accounts hacked.</p>
<p>So, what can you do? Always stay up to date with the latest Android versions and patches. Choose a brand that has a track record for releasing patches every 30 days. Blackberry is one of those brands, but few people use those devices. If 30 days is too long to wait, consider using the Google Pixel line of Android phones since, because Google makes the devices, patches and upgrades should be available for download immediately upon release. Note: Brand names are mentioned to provide value to you. We do not receive any kind of compensation for mentioning brands.  Another strategy is to install as few apps as possible on your device. Each app is a potential security issue and many people have installed apps that they realize are not essential, and some apps are rarely, if ever used.</p>
<p>Please forward this to anyone you know that uses Android devices and would like to be more secure.</p>
<p>The post <a href="https://fosterinstitute.com/1-million-android-user-accounts-reported-hacked/">1 Million Android User Accounts Reported Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Only One Virus is a Huge Problem</title>
		<link>https://fosterinstitute.com/only-one-virus-is-a-huge-problem/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 03 Nov 2016 15:34:55 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[Applying IT Patches]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Infected Apps]]></category>
		<category><![CDATA[Invisible Security Threats]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Virus]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Online Security]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Virus]]></category>
		<category><![CDATA[Click to Play]]></category>
		<category><![CDATA[cyber infection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[cyber security warning IT Pro Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[network security protections]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[updating patches]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[virus infections]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2390</guid>

					<description><![CDATA[<p>If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. Yesterday, someone told me their security was good since they only get infected by a few viruses each year. Even a single infection means there is a possibility that their machines are already [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/only-one-virus-is-a-huge-problem/">Only One Virus is a Huge Problem</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. <span id="more-2390"></span></p>
<p>Yesterday, someone told me their security was good since they only get infected by a few viruses each year. </p>
<p>Even a single infection means there is a possibility that their machines are already infected. </p>
<p>If one virus can get in, other undetectable viruses can too.</p>
<p>Unless security protections are very poor on a network or computer, visible virus infections are rare these days. </p>
<p>People who see virus infections need to act, including patching their Internet facing applications and enabling click-to-play. Those features already come with Windows and applications so there is nothing to buy or download. For more information, see foster institute dot come slash blog.</p>
<p>If you know someone whose computers on their network catch viruses, tell them the viruses are more like chest pain, not like the common cold. Infections are the sign of some greater damage that is about to, or already has, occurred.</p>
<p>The post <a href="https://fosterinstitute.com/only-one-virus-is-a-huge-problem/">Only One Virus is a Huge Problem</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Security Version 2.0</title>
		<link>https://fosterinstitute.com/security-version-2-0/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 28 Apr 2016 13:00:20 +0000</pubDate>
				<category><![CDATA[Adobe Flash]]></category>
		<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Application Updates]]></category>
		<category><![CDATA[browser security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Application List]]></category>
		<category><![CDATA[Application Safety]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[essential programs]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[non-essential programs]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Summarized Application Inventory]]></category>
		<category><![CDATA[tech support]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2306</guid>

					<description><![CDATA[<p>Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this… The application inventory shows how many machines have a specific program installed on them, such as: Qty &#8211; Application 18 &#8211; Adobe Flash [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/security-version-2-0/">Security Version 2.0</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is another powerful way to strengthen security – upgrade to the newest versions. Just like last week, your key tool will be your application inventory. It will look something like this…<span id="more-2306"></span></p>
<p>The application inventory shows how many machines have a specific program installed on them, such as:</p>
<p>Qty &#8211; Application<br />
18 &#8211; Adobe Flash Player version 11<br />
22 &#8211; Adobe Flash Player version 16<br />
79 &#8211; Adobe Flash Player version 20<br />
29 &#8211; Mozilla Firefox version 38.0.1<br />
99 &#8211; Mozilla Firefox version 44.0.2</p>
<p>Your list will be longer.</p>
<p>Notice that there are three versions of Adobe Flash Player and two versions of Firefox. </p>
<p>As you can imagine, more recent versions of software are generally the most secure. Most organizations such as Adobe and Mozilla recommend that you always use the most recent versions of their tools.</p>
<p>Using the most secure versions of applications is especially important for programs that interface directly to the Internet, such as Flash, Java, and your browsers. </p>
<p>Ask your IT Professionals to update, when possible, those kind of applications. Then, they can show you an updated application inventory report, one that shows the machines being all up-to-date. And, you’ll be able to sleep better at night.</p>
<p>Please forward this email message to everyone you care about…</p>
<p>The post <a href="https://fosterinstitute.com/security-version-2-0/">Security Version 2.0</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
