[IS&T Security-FYI] Security FYI Newsletter, June 15, 2015

Monique Buchanan myeaton at mit.edu
Mon Jun 15 07:56:44 EDT 2015


In this issue:

1. Microsoft Security Updates for June 2015
2. MIT Technology Review: Cyber Espionage Nightmare
3. EVENT: State of Cybersecurity Today Webcast


----------------------------------------------------------
1. Microsoft Security Updates for June 2015
----------------------------------------------------------

On Patch Tuesday last week, Microsoft released eight security bulletins<https://technet.microsoft.com/en-us/library/security/ms15-jun.aspx> (MS15-056 through MS15-064). Two are labeled critical, but four address remote code execution vulnerabilities that an attacker could use to take control of a user’s machine.

Systems affected include Microsoft Windows, Internet Explorer, Microsoft Office and Microsoft Exchange Server. The security update for Internet Explorer fixes 24 vulnerabilities in the browser.

Be sure to accept the updates as they occur, or go to the Windows Update<http://www.update.microsoft.com/> site. You may need to restart your machine after installing patches.

Read the story in the news<http://www.networkworld.com/article/2933335/microsoft-subnet/patch-tuesday-june-2015-4-of-microsofts-8-patches-close-remote-code-execution-holes.html>.


---------------------------------------------------------------------------
2. MIT Technology Review: Cyber Espionage Nightmare
---------------------------------------------------------------------------

An article featured on MIT Technology Review<http://www.technologyreview.com/featuredstory/538201/cyber-espionage-nightmare/> covers the disturbing state of corporate cyber espionage. According to the article, agents from China are wanted for allegedly hacking into networks at American companies, stealing emails about business strategy, documents and other information, all to benefit Chinese companies.

Although it seems unlikely that any arrests will be made in the case the US has made against these perpetrators, it does provide American companies with some valuable lessons. They are less likely to keep valuable information online, even if that information is “secured.” The most clear response is also the most drastic: unplug.

Read the full story at MIT Technology Review<http://www.technologyreview.com/featuredstory/538201/cyber-espionage-nightmare/>.


------------------------------------------------------------------
3. EVENT: State of Cybersecurity Today Webcast
------------------------------------------------------------------

Register for a free webcast hosted by MS-ISAC, occurring on Wednesday, June 24th, 3:00 - 4:00pm EST:

The State of CyberSecurity Today: How Far We Have Come & Where We Are Going
Presenter: Jeff Man, Tenable Network Security

This session provides a little history based on the presenter’s 20 years of experience in internet security. It explores how far we’ve come, the new and emerging challenges we face, and why old challenges continue to haunt security operations across the public and private sectors. It will dig into why we’re plagued by persistent issues, the factors driving cyber threats and what we can do to minimize their impact. It will look at information security policies, the role of compliance, and how no amount of “silver bullet” solutions are a substitute for sound processes that help increase the effectiveness of state, local, tribal and territorial government cybersecurity practices.

Save your seat by registering today<http://msisac.cisecurity.org/webcast/2015-06/>.


=======================================================================================
Read all archived Security FYI Newsletter articles and submit comments online at http://securityfyi.wordpress.com/.
=======================================================================================



Monique Buchanan
Social Communications Specialist
Information Systems & Technology (IS&T)
Massachusetts Institute of Technology
http://ist.mit.edu
tel: 617.253.2715






-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mailman.mit.edu/pipermail/ist-security-fyi/attachments/20150615/a8ab4a67/attachment.htm


More information about the ist-security-fyi mailing list