Jump to content

Search the Community

Showing results for tags 'it was patched yesterday'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • RVing Forums
    • Beginning RVing
    • General RV Information
    • Sharing the Fulltime Lifestyle
    • Graduating to Fulltime
    • Technical Tips and Tricks
    • Internet Access on the Road
    • Satellite TV and Radio on the Road
    • RVing on a Budget
    • Working on the Road
    • Volunteering Adventures
    • Day's End
    • Travel
    • Boondocking
    • RV Housekeeping
    • RV Action Items
    • Travel Logs
    • Escapees RV Club Events
    • Road to Escapade
    • RVing With Pets
    • RVing Families
  • RV Types
    • Class A
    • Class B
    • Class C
    • Fifth-Wheel
    • Travel Trailer
    • MDT
    • HDT
    • Bus Conversions
  • RV Marketplace
    • RV Rig Exchanges
    • RVs, Tows, and Toads for Sale
    • RV Accessories for Sale
    • RVs (And Accessories) Wanted
    • Workers Wanted
    • RVers Looking for Work
    • RV Sites/Lots/Memberships for Sale
  • Other Subjects
    • RVillage
    • Computers and Software
    • Amateur Radio
    • Activities and Hobbies
    • Veterans
    • Finances and Investing
    • Health Issues and Medical Insurance
    • Recipes
    • Other Topics
  • Site and Forum Operation
    • About the Discussion Forums
    • Bugs and Feature Requests
    • Test Posts


There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start





Website URL








RV Type

Found 1 result

  1. I know, MS already fixed it yesterday, but it served to get the attention needed for folks that are not patching their Windows machine. This is another Patch Tuesday that needs to be done ASAP because the vulnerabilities it fixes are being attacked now. Excerpt: "Observed attacks have started with a malicious Word document, which when opened downloads an exploit written in VBScript that's hosted on a webpage, according to malware analysts at Kaspersky Lab. The analysts are also confident the exploit they found is the same as the Double Kill attack Qihoo 360 Core Security reported. While the zero-day attacks are likely to be the work of state-sponsored attackers, Kaspersky Lab predicts it will become popular with cybercriminals as part of an exploit kit's arsenal for compromising Windows PCs in web-based attacks. That's because the technique allows an attacker to force IE to load and exploit the flaw on an unpatched machine even if victims have set Chrome or Firefox as the default browser." All the technical details are in the full article here with related links here: https://www.zdnet.com/article/windows-critical-flaw-this-security-bug-is-under-attack-right-now-says-microsoft/?ftag=TREc64629f&bhid=19724681974700635514865380622813 Safe computing!
  • Create New...