
You can hide your files in the shadows for now. But maybe not later.
The post Trekkie ransomware – your files may be safe in the shadows appeared first on Avira Blog.

You can hide your files in the shadows for now. But maybe not later.
The post Trekkie ransomware – your files may be safe in the shadows appeared first on Avira Blog.
Posted by SEC Consult Vulnerability Lab on Mar 22
SEC Consult Vulnerability Lab Security Advisory < 20170322-0 >
=======================================================================
title: Multiple vulnerabilities
product: Solare Datensysteme GmbH
Solar-Log 250/300/500/800e/1000/1000 PM+/1200/2000
vulnerable version: Firmware 2.8.4-56 / 3.5.2-85
fixed version: Firmware 3.5.3-86
CVE number: –
impact: Critical…
The first Antarctic Biennale expedition aboard the research vessel “Akademik Sergey Vavilov” began on March 17 in Ushuaia and will last for 12 days.
[ERPSCAN-16-041] SAP NETWEAVER DIRECTORY CREATION OUTSIDE OF THE JVM
Defense in depth — the Microsoft way (part 47): “AppLocker bypasses are not serviced via monthly security roll-ups”
Red Hat Enterprise Linux: An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux
6.
Red Hat Enterprise Linux: An update for fence-agents is now available for Red Hat Enterprise Linux 6.
Red Hat Enterprise Linux: An update for mdadm is now available for Red Hat Enterprise Linux 6.
Red Hat Enterprise Linux: An update for compat-sap-c++ is now available for Red Hat Enterprise Linux 6.
Red Hat Enterprise Linux: An update for glib2 is now available for Red Hat Enterprise Linux 6.