Operating Systems

Operating Systems | News, how-tos, features, reviews, and videos

xbox booth

Microsoft updates trust list after private key for Xbox Live leaks

On Tuesday, Microsoft updated their Certificate Trust List (CTL) after the private key for xboxlive.com was leaked to the Web. The company didn't explain how the leak happened, but the exposed certificates were immediately revoked and...

covered bridge

Building bridges in a fractured security ecosystem

Because legacy systems are required and often critical to the daily operations of an enterprise, many companies are still using operating systems or applications that cannot be patched.

Microsoft targets Apple with Surface Book launch [2015]

2015: The most prolific year for OS X malware ever

2015 is a year that will be remembered and pinned for later reference by Apple's software and security engineers. This, is the most prolific year for OS X Malware in history.

bad apple

Windows users often forget to patch their Apple programs

A survey of applications installed on Windows computers found many people don't run up-to-date versions of Apple programs.

windows 10 store

Did Microsoft shove Windows 10 down people’s throats?

That’s what users are saying, shoved down their throats, with many users still having issues with the unwanted Windows 10 OS.

osx el capitan

Is Apple's security honeymoon on OS X ending?

Apple scored unforgettable hits against Microsoft with its Mac vs. PC ads, which anthropomorphized Windows as a sneezing, miserable office worker.

6 mspatchtuesday

Experts warn users to quickly apply Microsoft Patch Tuesday updates

Security experts weigh in on Microsoft Patch Tuesday with advice about which updates are most urgent and what you need to know to protect yourself against exploits.

microsoft logo redwest a

Strange Windows update creates confusion, panic

On Wednesday, Windows users – both home and enterprise – started sharing details on a strange update delivered by Microsoft. The update itself used a string of random characters in the description, along with resource URLs using a...

Victim of identity theft

Microsoft patches yet another Hacking Team zero-day exploit

Microsoft fixed a previously unreported vulnerability discovered in the cache of files leaked from Italian surveillance company Hacking Team in July.

reward poster

Researcher to FireEye: If you're not paying, I'm not talking

On Sunday, Kristian Erik Hermansen disclosed an unauthorized file disclosure vulnerability in FireEye's core product. The zero-day disclosure quickly generated public attention, as did the discussion around three other vulnerabilities...

abstract rack of servers datacenter networking hardware

Researcher discloses zero-day vulnerability in FireEye

On Sunday, Kristian Erik Hermansen disclosed a zero-day vulnerability in FireEye's core product, which if exploited, results in unauthorized file disclosure. As proof, he also posted a brief example of how to trigger the vulnerability...

keychain access icon

Researchers discover new keychain vulnerability in OSX

Antoine Vincent Jebara and Raja Rahbani, the co-founder and lead engineer of MyKi – an identity management company in Beirut - have discovered a vulnerability in Apple's password management system (Keychain), which if exploited,...

Windows 10 Privacy Settings

Is Windows 10 the end of privacy as we know it?

Some are freaking out over Windows 10 privacy settings but Microsoft is not "Big Brother" and the features and services that make Windows 10 great require some tradeoffs of privacy for functionality.

ie cracked

Microsoft drops emergency patch for Internet Explorer

On Tuesday, Microsoft released a patch for all supported versions of Internet Explorer, including Windows 10. The patch addresses a memory corruption vulnerability, one that is actively being exploited by criminals.

windows 10 desktop

Key things to consider before you switch to Windows 10

Microsoft has started pushing Windows 10 updates, as the newest operating system officially launched last month. However, the latest and greatest might not be the best fit for some organizations, and there are some things that need to...

windows hello

When will we actually be able to say ‘hello’ to Windows Hello?

Windows 10 comes with Windows Hello authentication to provide better security, but few users have the hardware required to log in using facial recognition, iris scanning, or fingerprint scanning.

malware keyboard skull and crossbones

Newest RIG exploit kit driven by malicious advertising

Earlier this year, a disgruntled reseller leaked the source code for version 2.0 of the RIG exploit kit. Since then, the RIG's author has released a new version, which was recently discovered by researchers from Trustwave. The latest...

Windows 10 action center

How to get the most out of Windows 10 enterprise security features

Although the return of the Start menu and putting the focus back on the desktop are moves calculated to help Windows 10 appeal to business users, the security improvements may be a more strategic reason for considering an upgrade. But...

abstract rack of servers datacenter networking hardware

Xen patches new virtual-machine escape vulnerability

A new vulnerability in emulation code used by the Xen virtualization software can allow attackers to bypass the critical security barrier between virtual machines and the host operating systems they run on.

Microsoft sign closeup

Researchers disclose four unpatched vulnerabilities in Internet Explorer

Security researchers published limited details about four unpatched vulnerabilities in Internet Explorer because Microsoft has not moved quickly enough to fix them. The flaws could potentially be exploited to execute malicious code on...

Load More
You Might Also Like