Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     

  Technical Updates (Archive) [Page: 564 of 2488]  

12.349.2016 - F4F recognised as a Category Finalist at Kaap Agri Supplier of the Year 2016 Awards



View RealWire related news. Kaap Agri, one of the largest agricultural co-operatives in South Africa, and with over 180 operating points, recently hosted their Annual Supplier Awards dinner. Kaap Agri recognises that their supplier relationships are essential to providing Kaap Agri customers with excellent products and services. F4F, part of Proagrica, were nominated and recognised in the Information Management category for developing an iPaaS (Integrated Platform as a Service) solution and facilitating data exchange with the end goal of... Source: RealWire
Full View / NID: 62535 / Submitted by: The Zilla of Zuron

12.349.2016 - ClusterSeven Named Best-of-breed Solution for Data Integrity and Control in 2016 Chartis FinTech Quadrant™



View RealWire related news. ClusterSeven the only EUC management solution provider in the best-of-breed categoryLondon, U.K., 14 December 2016 - ClusterSeven, the leading provider of strategic software for End User Computing (EUC) management, today announced that Chartis, a research provider on global market for risk technology, has named its EUC governance platform as ‘best-of-breed’ in its 2016 FinTech Quadrant for data integrity and control solutions in financial services. ClusterSeven is the only EUC management solutions provider included in the... Source: RealWire
Full View / NID: 62534 / Submitted by: The Zilla of Zuron

12.349.2016 - Rajant Appoints Geoff Smith Executive Vice President, Sales and Marketing to Drive Global Expansion



View RealWire related news. Move Comes as Company Adds Other New Employees, Opens Two Facilities to Manage GrowthPHILADELPHIA - December 14, 2016 - In order to meet the company’s growth trajectory, Rajant, the pioneer of innovative mobile mesh technology for private wireless networks, announced today the hiring of Geoff Smith as Executive Vice President of Global Sales and Marketing, and Bernard Taliaferro as Channel Director. The company also opened facilities in Arizona and Kentucky, and added 20 employees overall.Rajant... Source: RealWire
Full View / NID: 62533 / Submitted by: The Zilla of Zuron

12.349.2016 - AI for Hobbyists: DIYers Use Deep Learning to Shoo Cats, Harass Ants



View NVIDIA related news.

Robots recklessly driving cheap electric kiddie cars. Autonomous machines shining lasers at ants — and spraying water at bewildered cats — for the amusement of cackling grandchildren. Hobbyists are just getting started with deep-learning technologies that give them cheap, off-the-shelf capabilities that put Ronald Reagan’s Star Wars program to shame. In the latest edition of […]

The post AI for Hobbyists: DIYers Use Deep Learning to Shoo Cats, Harass Ants appeared first on The Official NVIDIA Blog.

Full View / NID: 62532 / Submitted by: The Zilla of Zuron

12.349.2016 - Just Scroll with It: AI Could Reveal Text on Ancient Papyrus Buried by Vesuvius



View NVIDIA related news.

When Mount Vesuvius buried Pompeii in volcanic ash more than 2,000 years ago, it also buried a library of scrolls in the nearby town of Herculaneum that scholars have struggled to read since their discovery more than 250 years ago. But Herculaneum, the only surviving library from the classical world, could soon reveal its hidden […]

The post Just Scroll with It: AI Could Reveal Text on Ancient Papyrus Buried by Vesuvius appeared first on The Official NVIDIA Blog.

Full View / NID: 62531 / Submitted by: The Zilla of Zuron

12.349.2016 - Intel to Showcase Amazing Experiences at CES 2017



View Intel-Press related news. p>At CES 2017, Intel will highlight new technologies that power every segment of the smart, connected world. We’re expanding the boundaries of technology – via computing breakthroughs in artificial intelligence, 5G technology, virtual reality and self-driving cars – to make the most amazing experiences possible. Press Conference – A Virtual Reality Experience Intel CEO Brian …...
Full View / NID: 62530 / Submitted by: The Zilla of Zuron

12.349.2016 - 2017 CES



View Intel-Press related news. p>At CES 2017, Intel will highlight new technologies that power every segment of the smart and connected world. Intel and its leaders are expanding the boundaries of technology through computing breakthroughs in artificial intelligence, 5G technology, virtual reality and self-driving cars – to make the most amazing experiences possible. Event Details Intel to Showcase Amazing …...
Full View / NID: 62529 / Submitted by: The Zilla of Zuron

12.349.2016 - Trend Micro Virus Definitions - 12.959.50



View Trendmicro related news. The Official Pattern Release or OPR is Trend Micro's latest compilation of patterns for identified viruses. It is guaranteed to have passed a series of critical tests to ensure that customers get optimum protection from the latest virus threats.
Full View / NID: 62528 / Submitted by: The Zilla of Zuron

12.349.2016 - Italtel’s Transportable Data Centers Used by NATO for “Summer Tempest - Eagle Meteor 2016”



View RealWire related news. Milan, December 14, 2016 - Italtel, a leading telecommunications company in Network Functions Virtualization (NFV), managed services and all-IP communication, today announced its transportable data centers at the NATO Rapid Deployable Corps Italy (NRDC - ITA) have been used for the first time during the “Summer Tempest - Eagle Meteor 2016” training exercise.The exercise, which brought together several armies from member countries of the Atlantic Alliance, was managed by the NRDC-ITA, stationed in Solbiate Olona.... Source: RealWire
Full View / NID: 62527 / Submitted by: The Zilla of Zuron

12.349.2016 - Gooligan: Malware is not the only problem



View RealWire related news. Comment by Dennis Monner, CEO of German security specialist SecucloudHamburg, Germany. 14 December 2016 - Many users of Android mobiles have been alarmed by a recent warning that the Gooligan malware has infected over a million devices around the world, although only about 9 per cent of the victims are located in Europe. Gooligan targets the older versions 4 and 5 of the Android operating system - and is very successful doing so. That should... Source: RealWire
Full View / NID: 62526 / Submitted by: The Zilla of Zuron

12.349.2016 - New Regional Vice-President South Appointed at Nuvias Group



View RealWire related news. Nuvias plans to further grow its Southern European business London, England: 14th December, 2016: Patric Berger has been appointed Regional Vice-President South for pan-EMEA high value distributor Nuvias Group. In his new role, he will be responsible for all business aspects within the Southern European region, which includes France, Italy, Spain, Malta and the Mediterranean. Berger is also tasked with growing Nuvias’ business in this area. He will be based at the Group’s French office... Source: RealWire
Full View / NID: 62525 / Submitted by: The Zilla of Zuron

12.349.2016 - Medelinked Open Health Platform Now Features Medelinked Health Score



View RealWire related news. Enhanced user interface makes getting key information and insights about individual health easierPCHA Connected Health Conference, Washington, DC, 14th December 2016 - Medelinked is a secure mobile and online health platform that empowers people to take control of their health, from building their health profile to discovering, connecting to and sharing their health and wellness information with their trusted healthcare providers.Demonstrated for the first time at PCHA Connected Health Conference, Washington, DC, Medelinked now features... Source: RealWire
Full View / NID: 62524 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-144 - Critical: Cumulative Security Update for Internet Explorer (3204059) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 62799 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-148 - Critical: Security Update for Microsoft Office (3204068) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 62596 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-154 - Critical: Security Update for Adobe Flash Player (3209498) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Full View / NID: 62595 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-137 - Important: Security Update for Windows Authentication Methods (3199173) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the November Security Only updates.Security Only update 3197867 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197867.Monthly Rollup 3197868 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197868.Security Only update 3197876 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197876.Monthly Rollup 3197877 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197877. Security Only update 3197873 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197873.Monthly Rollup 3197874 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197874.These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege. To exploit this vulnerability, the attacker would first need to authenticate to the target, domain-joined system using valid user credentials. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator.
Full View / NID: 62578 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-135 - Important: Security Update for Windows Kernel-Mode Drivers (3199135) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the November Security Only updates.Security Only update 3197867 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197867.Monthly Rollup 3197868 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197868.Security Only update 3197876 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197876.Monthly Rollup 3197877 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197877. Security Only update 3197873 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197873.Monthly Rollup 3197874 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197874.These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Full View / NID: 62577 / Submitted by: The Zilla of Zuron

12.348.2016 - MS15-094 - Critical: Cumulative Security Update for Internet Explorer (3089548) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (December 13, 2016): Bulletin revised to include an additional vulnerability, CVE-2015-2496. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action..
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 62571 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-131 - Critical: Security Update for Microsoft Video Control (3199151) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the November Security Only updates.Security Only update 3197867 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197867.Monthly Rollup 3197868 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197868.Security Only update 3197876 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197876.Monthly Rollup 3197877 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197877. Security Only update 3197873 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197873.Monthly Rollup 3197874 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197874.These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.
Full View / NID: 62567 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-124 - Important: Security Update for Windows Registry (3193227) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the October Security Only updates. - Security Only update 3192391 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3192391. - Security Only update 3192393 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3192393 - Security Only update 3192392 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3192392. These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker can access sensitive registry information.
Full View / NID: 62565 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-151 - Important: Security Update for Windows Kernel-Mode Drivers (3205651) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 13, 2016): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Full View / NID: 62557 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-134 - Important: Security Update for Common Log File System Driver (3193706) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (December 13, 2016): Bulletin publish Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the November Security Only updates.Security Only update 3197867 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197867.Monthly Rollup 3197868 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197868.Security Only update 3197876 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197876.Monthly Rollup 3197877 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197877. Security Only update 3197873 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197873.Monthly Rollup 3197874 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197874.These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerability could allow elevation of privilege when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. In a local attack scenario, an attacker could exploit these vulnerabilities by running a specially crafted application to take complete control over the affected system. An attacker who successfully exploits this vulnerability could run processes in an elevated context.
Full View / NID: 62554 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-132 - Critical: Security Update for Microsoft Graphics Component (3199120) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the November Security Only updates.Security Only update 3197867 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197867.Monthly Rollup 3197868 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197868.Security Only update 3197876 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197876.Monthly Rollup 3197877 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197877. Security Only update 3197873 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197873.Monthly Rollup 3197874 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197874.These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe being of the vulnerabilities could allow a remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory if a user visits a malicious webpage. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. This security update is rated Critical for all supported releases of Microsoft Windows. For more information, see the Affected Software and Vulnerability Severity Ratings section.
Full View / NID: 62553 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-130 - Critical: Security Update for Microsoft Windows (3199172) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the November Security Only updates.Security Only update 3197867 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197867.Monthly Rollup 3197868 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3197868.Security Only update 3197876 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197876.Monthly Rollup 3197877 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3197877. Security Only update 3197873 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197873.Monthly Rollup 3197874 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3197874.These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if a locally authenticated attacker runs a specially crafted application.
Full View / NID: 62552 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-147 - Critical: Security Update for Microsoft Uniscribe (3204063) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Windows Uniscribe. The vulnerability could allow remote code execution if a user visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update addresses the vulnerabilities by correcting how the Windows Uniscribe handles objects in the memory.
Full View / NID: 62545 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-152 - Important: Security Update for Windows Kernel (3199709) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: The security update addresses the vulnerability by helping to ensure the kernel API correctly enforces access controls applied to this information. This security update resolves a vulnerability in Microsoft Windows. An information disclosure vulnerability exists when the Windows Kernel improperly handles objects in memory.
Full View / NID: 62544 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-155 - Important: Security Update for .NET Framework (3205640) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (December 13, 2016):
Summary: This security update resolves a vulnerability in Microsoft .NET 4.6.2 Framework’s Data Provider for SQL Server. A security vulnerability exists in Microsoft .NET Framework 4.6.2 that could allow an attacker to access information that is defended by the Always Encrypted feature.
Full View / NID: 62537 / Submitted by: The Zilla of Zuron

12.348.2016 - AMD Takes Computing to a New Horizon with Ryzen(TM) Processors



View AMD related news. Reveals Brand Name, New Performance Details, and Adaptive Technology Features of Upcoming High-Performance Processors Based on "Zen" Core Architecture AUSTIN, TX -- (Marketwired) -- 12/13/16 -- Today at its fan-focused event, AMD (NASDAQ: AMD) unveiled new information and gave enthusiasts hands-on time with its upcoming high-performance desktop processors based on the innovative "Zen" core architecture (codenamed "Summit Ridge") in advance of the official launch in Q1 2017. Drawing inspiration from the core's name and AMD's desire to push high-performance CPUs to a new horizon, AMD introduced Ryzen™, the brand which will span across "Zen"-based desktop and notebook processor families. Add...
Full View / NID: 62523 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-126 - Moderate: Security Update for Microsoft Internet Messaging API (3196067) - Version: 2.0



View Microsoft related news. Severity Rating: Moderate
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the October Security Only updates. - Security Only update 3192391 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3192391. - Security Only update 3192393 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3192393 - Security Only update 3192392 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3192392. These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-126, and the update in MS16-118.
Full View / NID: 62522 / Submitted by: The Zilla of Zuron

12.348.2016 - MS16-123 - Important: Security Update for Windows Kernel-Mode Drivers (3192892) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (December 13, 2016): Revised bulletin to announce the following updates have been rereleased with a detection change that addresses a supersedence issue that certain customers experienced when attempting to install the October Security Only updates. - Security Only update 3192391 for all supported releases of Windows 7 and Windows Server 2008 R2. For more information, see Microsoft Knowledge Base Article 3192391. - Security Only update 3192393 for Windows Server 2012. For more information, see Microsoft Knowledge Base Article 3192393 - Security Only update 3192392 for Windows 8.1 and Windows Server 2012 R2. For more information, see Microsoft Knowledge Base Article 3192392. These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
Full View / NID: 62521 / Submitted by: The Zilla of Zuron
  Popular Tech News  
  Most Viewed News  
  Top Affiliates  
.....