Archives - Vulnerabilities


Check and remove unnecessary software

Cyberattackers can assault your computer by utilizing software vulnerabilities, so the less software programs you have installed, the fewer paths there are for possible attack. Evaluate the software installed on your computer. If you don’t know what a software program does, research the program to determine whether or not the program is necessary. Remove any […]

Keep all of your electronic device software current

Manufacturers issue updates as they discover vulnerabilities in their products. Automatic updates make this easier for many devices—including computers, phones, tablets, and other smart devices—but you may need to manually update other devices. Only apply updates from manufacturer websites and built-in application stores—third-party sites and applications are unreliable and can result in an infected device. […]

Be wary of update links in an email message

Attackers have used email messages to direct users to websites hosting malicious files disguised as legitimate software updates. Users should also be suspicious of email messages that claim to have a software update file attached—these attachments may contain malware.

Keep your Netflix and Spotify updated

Cybercriminals tend to target out-of-date programs since they have less advanced security built into them. Netflix and Spotify are two of the hottest targets for hackers, who steal login information and sell it on the black market to those who don’t want to pay the full amount for an account. The longer you wait to […]

Keep all of your personal electronic device software current

Manufacturers issue updates as they discover vulnerabilities in their products. Automatic updates make this easier for many devices—including computers, phones, tablets, and other smart devices—but you may need to manually update other devices. Only apply updates from manufacturer websites and built-in application stores—third-party sites and applications are unreliable and can result in an infected device. […]

What is end-of-life software?

Sometimes vendors will discontinue support for a software program or issue software updates for it (also known as end-of-life [EOL] software). Continued use of EOL software poses consequential risk to your system that can allow an attacker to exploit security vulnerabilities present that could result in malware attacks. The use of unsupported software can also […]