Computer Games – Super Mario 64 3-D innovations 25 years ago

Uncategorized Comments Off on Computer Games – Super Mario 64 3-D innovations 25 years ago

PC Magazine documents Super Mario 64 innovations 25 years ago, where 3-D graphics were successfully implemented in computer gaming for a major release

25 Years Ago, Super Mario 64 Rocketed Nintendo Into the Third Dimension | PCMag

But as Nintendo prepared to release its fifth-generation console, the Nintendo 64, the company knew that incremental improvements on the formula weren’t going to cut it. The next Mario game needed to take a mighty leap into the third dimension and do for platformers what the original game had done in 1985. And 25 years ago, Nintendo did just that. But the path to get there would be a long and winding one.

Super Mario 64 was an immediate success both critically and commercially. As one of the Nintendo 64’s launch titles, it sold half a million copies in its first three months of release, becoming a system-defining game. It also laid the groundwork for the entire genre of 3D platformers. In addition to the camera innovations, the game’s hub area that led to multiple levels that could be completed in any order became a staple of the genre, as did the level goals being changed from finding the finish line to collecting stars.

CISA – Medical security alert for Zoll Defibrillator June 2020

Uncategorized Comments Off on CISA – Medical security alert for Zoll Defibrillator June 2020

CISA Releases Advisory on ZOLL Defibrillator Dashboard | CISA

https://us-cert.cisa.gov/ics/advisories/icsma-21-161-01

CISA has released an Industrial Controls Systems (ICS) Medical Advisory on multiple vulnerabilities in the ZOLL Defibrillator Dashboard. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.  CISA encourages users and administrators to review the ICS Medical Advisory ICSMA-21-161-01 and apply the recommended mitigations.

Apple iOS 12.5.4 – June 2021 security release

Uncategorized Comments Off on Apple iOS 12.5.4 – June 2021 security release

Users should update to latest version of Apple iOS to better protect their devices

Apple Releases Security Updates for iOS 12.5.4 | CISA

About the security content of iOS 12.5.4 – Apple Support

Security – Available for: iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch (6th generation) … Impact: Processing a maliciously crafted certificate may lead to arbitrary code execution … Description: A memory corruption issue in the ASN.1 decoder was addressed by removing the vulnerable code.

CVE-2021-30737: xerub

FTC – Family emergency scams June 2021

Uncategorized Comments Off on FTC – Family emergency scams June 2021

The FTC shares safety advice to avoid robocalls & other attacks related to “Family emergency scams”

Don’t send them money | FTC Consumer Information

Family emergency scams like this try to scare people into sending money to help a loved one in trouble. The fraud can play out in many ways, but the hustle is the same: the caller lies, tries to scare you, and rushes you to pay so you don’t have time to think twice or check things out before you send money. And once you do that, you’ll never get it back.

To avoid family emergency scams:

    • Resist the urge to act immediately — no matter how dramatic the story is.
    • Call or message your loved one who (supposedly) contacted you. Even though the caller says not to. But use a number you know is right, not one the caller gives you.
    • Never send cash, gift cardscryptocurrencyor money transfers. Once the scammer gets the money, it’s gone!

FTC – Best Safety practices for online purchases June 2021

Uncategorized Comments Off on FTC – Best Safety practices for online purchases June 2021

Excellent advice & safety practices from FTC for online shopping

What to know before you buy something online | FTC Consumer Information

What to know before you buy something onlineBefore you start filling up your online shopping cart, we’ve got some tips you’ll want to check out (no pun intended!).

Do some comparison-shopping. Before you buy online, use the power of the internet to compare prices on different websites. We’ve got tips about using comparison-shopping sites.

Think critically about online reviews. Reading other people’s opinions about a product can help you make a decision. But some reviews are downright fake or not completely honest. You may not know when a reviewer got something — like a free product — in exchange for the review. Learn more about how to evaluate online reviews.

Pay attention to the details. Before you buy something online, know when it’ll ship and what to do if you want to return it. Read up on delivery, return, and refund policies.

Pay with a credit card if you can. That way, if you get billed twice for the same item, or you get billed for something you never got, you can dispute it. Learn more about the benefits of paying with a credit card.

Find out what personal information shopping apps collect. Shopping apps might give you exclusive deals or rewards points. But they might also take your personal information, like your name, phone number, and email. And they might use your device’s location. Here’s what to know if you’re using a shopping app.

CISA – Ransomware in operational services June 2021

Uncategorized Comments Off on CISA – Ransomware in operational services June 2021

Recent attacks to key infrastructure operations like Darkside & other attacks are continuing & CISA offers latest guidance to help detect/prevent

CISA Addresses the Rise in Ransomware Targeting Operational Technology Assets | CISA

Ransomware Threat to OT | CISA

CISA has published the Rising Ransomware Threat to OT Assets fact sheet in response to the recent increase in ransomware attacks targeting operational technology (OT) assets and control systems. The guidance:

    • provides steps to prepare for, mitigate against, and respond to attacks;
    • details how the dependencies between an entity’s IT and OT systems can provide a path for attackers; and
    • explains how to reduce the risk of severe business degradation if affected by ransomware.

CISA encourages critical infrastructure (CI) owners and operators to review the Rising Ransomware Threat to OT Assets fact sheet as well as CISA’s Ransomware webpage to help them in reducing their CI entity’s vulnerability to ransomware.

SAP – June 2021 product security updates

Uncategorized Comments Off on SAP – June 2021 product security updates

Cisco is a key application vendor for many organizations & several products have had recent security updates. CISA reported active exploitation of SAP back in April — so all ADMINS should promptly patch these security exposures,

SAP Releases June 2021 Security Updates | CISA

SAP Security Patch Day – June 2021 – Product Security Response at SAP – Community Wiki

Computer Safety & News – SAP – Active cyberattacks on vulnerable systems April 2021 (msmvps.com)

SAP has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.  CISA encourages users and administrators to review the SAP Security Notes for June 2021 and apply the necessary updates.   On 8th of June 2021, SAP Security Patch Day saw the release of 17 Security Notes. There were 2 updates to previously released Patch Day Security Notes.

Firefox 89 – improved web security for deceptive designs

Uncategorized Comments Off on Firefox 89 – improved web security for deceptive designs

Mozilla shares how deceptive designs may trick end-users into opting into unwanted or even less secure website options.  Firefox 89 was designed with some improvements to better isolate web v. Firefox actions & messages as shared below:

What are deceptive design patterns and how can you spot them? (mozilla.org)

Deceptive design patterns show up as tricky color schemes, frustrating mazes, sneaky designs and confusing language. Websites use these techniques to influence your behavior into a direction that benefits them more than it benefits you. Here are examples of deceptive or manipulative designs you might run into.

Confusing design and language

You won’t find deceptive designs on every website, but we’ve all experienced confusing situations like:

    • A “No thanks” button that is pale grey but the “Sign me up” button is enticingly bright blue.
    • A box that is pre-checked, making it unclear if you are opting in or opting out if you uncheck it.
    • A graphic that has an X-out box as part of the design rather than being functional. When you click the X, you are redirected to a webpage.
    • A site that’s swimming with so many buttons, you’re almost bound to click one of them.

They may also appear in text taking the form of:

    • Double negatives like Do not uncheck this box if you want to keep receiving emails from us.
    • Buried opt-out explanations in the terms and conditions fine print.
    • Hurdles for closing an account, like listing reasons you shouldn’t instead of simply respecting your wishes.
    • Word choices that make it unclear what you’re choosing.

Firefox brings more clarity

The Firefox team designs experiences that are clear in their messaging and respectful of your time and attention. In our latest June release, the user interface has been updated so that there is no mistaking when Firefox is “talking to you” vs the site you’re on. Similarly, our notifications and messages make it clear that you have a choice to engage with them, and that using features should be a considered decision you make, not something we slip past you. Our products are designed to meet your needs and help you enjoy everything the web offers without trickery to get in your way.

Sonicwall SRA 4600 – 2019 Vulnerability being exploited

Uncategorized Comments Off on Sonicwall SRA 4600 – 2019 Vulnerability being exploited

As SANS ISC shares Sonicwall SRA 4600 devices are being scanned & targeted to see if an older 2019 vulnerability has been patched

Sonicwall SRA 4600 Targeted By an Old Vulnerability (sans.edu)

A group of attackers is targeting Sonicwall devices through the vulnerability described in CVE-2019-7481. Yes, a vulnerability from 2019! It affects Sonicwall SRA (“Secure Remote Access”) 4600 devices running firmware versions 8.x and 9.x. Crowdstrike published a nice blog post about this vulnerability.  If you run a Sonicwall device affected by this vulnerability, please review your current firmware and patch!

[1] https://www.hsgac.senate.gov/imo/media/doc/Testimony-Blount-2021-06-08.pdf
[2] https://www.crowdstrike.com/blog/how-ecrime-groups-leverage-sonicwall-vulnerability-cve-2019-7481/

Fortinent VPN – unpatched versions under attack

Uncategorized Comments Off on Fortinent VPN – unpatched versions under attack

SANS Internet Storm Center warns of active discovery & attacks for Fortinent’s FortiProxy SSL VPN.  All ADMINS should move users to the latest version expediently

Fortinet Targeted for Unpatched SSL VPN Discovery Activity (sans.edu)

210527.pdf (ic3.gov)

Fortinet has fixed several critical vulnerabilities in SSL VPN and web firewall this year from Remote Code Execution (RCE) to SQL Injection, Denial of Service (DoS) which impact the FortiProxy SSL VPN and FortiWeb Web Application Firewall (WAF) products.  Two weeks ago, US-CERT released an alert re-iterating that APT actors are looking for Fortinet vulnerabilities to gain access to networks.

 


© 2021 Computer Safety & News.
WordPress Theme & Icons by N.Design Studio. Provided by WPMU DEV -The WordPress Experts   Hosted by Microsoft MVPs
Entries RSS Comments RSS Log in