the December 2018 security patch early , Samsung has now revealedVulnerability-related.PatchVulnerabilitythe details of the latest security maintenance release . The Galaxy Xcover 4 is the first smartphone to getVulnerability-related.PatchVulnerabilitythis update . Samsung will be releasingVulnerability-related.PatchVulnerabilitythe patch for more compatible devices in the coming weeks . It has detailed the contents of this patch as part of its monthly security maintenance release process . The update includes patches from Google for Android in addition to patches from Samsung for its custom software . The December 2018 security patch has fixes for six critical vulnerabilities discoveredVulnerability-related.DiscoverVulnerabilityin the Android operating system . The most severe vulnerability in the framework section could enable a malicious app to run unapproved code in the context of a privileged process . However , no moderate or low-risk vulnerabilities were required to be patchedVulnerability-related.PatchVulnerabilityin this latest security maintenance release . The updateVulnerability-related.PatchVulnerabilitydoes bringVulnerability-related.PatchVulnerabilityquite a patches for 40 Samsung Vulnerabilities and Exposures ( SVE ) items . This includes a vulnerability in the Secure Folder app which could have allowed access without authentication . Another vulnerability in the app could have resulted in the exposure of the gallery app without authentication . Therefore , Samsung will now get down to the business of rolling outVulnerability-related.PatchVulnerabilitythe December 2018 security patch to supported devices . We should expect some handsets to start receiving it within the next few days . The company may start rolling it out to high-end devices first .
Adobe has releasedVulnerability-related.PatchVulnerabilityupdates fixingVulnerability-related.PatchVulnerabilitya long list of security vulnerabilities discoveredVulnerability-related.DiscoverVulnerabilityin the Mac and Windows versions of Acrobat and Reader . In total , the first October update brings 85 CVEs , including 47 rated as ‘ critical ’ with the remaining 39 classified as ‘ important ’ . It ’ s too early to get much detail on the flaws but those rated critical break down as 46 allowing code execution and one allowing privilege escalation . The majority of the flaws rated important involve out-of-bounds read issues leading to information disclosure . As far as Adobe is aware , none are being actively exploited . The update you should download depends on which version you have installed : For most Windows or Mac users it ’ ll be either Acrobat DC ( the paid version ) or Acrobat Reader DC ( free ) so look for update version 2019.008.20071 . For anyone on the classic Acrobat 2017 or Acrobat Reader DC 2017 , it ’ s version 2017.011.30105 . Those on the even more classic Acrobat DC ( 2015 ) or Acrobat Reader DC ( 2015 ) it ’ s version 2015.006.30456 . Anyone who still has the old Acrobat XI or Reader XI on their computer , the last version was 11.0.23 when support for this ended a year ago . A sign of success ? There was a time when having to patchVulnerability-related.PatchVulnerabilityso many flaws in a small suite of products from one company would have been seen as a failure . Arguably , these days , it ’ s a sign of success – researchers are devoting the time to findingVulnerability-related.DiscoverVulnerabilityvulnerabilities before the bad guys do and Adobe is turning around fixes . What ’ s surprising is that despite crediting every one of them ( and it ’ s quite a list ) , the company doesn ’ t seem to have a formal bug bounty reward program other than the separate web applications program run via third party company , HackerOne . If Adobe ’ s 85 vulnerabilities sounds excessive , have some sympathy for users of the rival Foxit PDF Reader and Foxit PhantomPDF programs . Foxit last week released what appears to beVulnerability-related.DiscoverVulnerability116 vulnerabilities of their own ( confusingly , many of which are not yet labelled with CVEsVulnerability-related.DiscoverVulnerability) . For some reason , the number of flaws being foundVulnerability-related.DiscoverVulnerabilityin Foxit ’ s programs has surged this year , reaching 183 before this September ’ s count , compared to 76 for the whole of 2017 . As for Adobe , these updates are unlikely to be the last we hear of the company this month – expect the usual flaws to be patchedVulnerability-related.PatchVulnerabilityin Adobe ’ s legacy Flash plug-in when Microsoft releasesVulnerability-related.PatchVulnerabilityits Windows Patch Tuesday on 9 October .
Networked printers for years have left gaping holes in home and office network security . Today , experts continue to findVulnerability-related.DiscoverVulnerabilityflaws in popular laser printers , which are putting businesses at risk . Experts at the University Alliance Ruhr recently announcedVulnerability-related.DiscoverVulnerabilityvulnerabilities in laser printers from manufacturers including Dell , HP , Lexmark , Samsung , Brother , and Konica . The flaws could permit print docs to be captured , allow buffer overflow exploits , disclose passwords , or cause printer damage . Up to 60,000 currently deployed printers could be vulnerableVulnerability-related.DiscoverVulnerability, they estimate . When unprotected , printers expose users to several types of attacks , says Jeremiah Grossman , chief of security strategy at SentinelOne . Hackers can use vulnerabilities to capture old printer logs , which may contain sensitive information . They may also use these flaws to establish their foothold in a networked device and move laterally throughout the organization to gather data . Some attackers want to wreak havoc outside a single business . With networked printers under their control , a cybercriminal may use one company 's bandwidth to perform DDoS attacks on other organizations and individuals around the world . These examples are among the many types of damage that will continue to threaten security as part of the growing Internet of Things , Grossman predicts . `` Most of the time , printers are not going to be terribly different from any IoT device , '' he explains . Hackers who findVulnerability-related.DiscoverVulnerabilityvulnerabilities in the web interface can take over , as they could for any device connected to the network . The difference , of course , is printers have been around far longer than most IoT products . This presents a market failure that will be difficult to correct because patches wo n't be made availableVulnerability-related.PatchVulnerability. Even when they are , devices wo n't be patchedVulnerability-related.PatchVulnerabilityoften . Right now the easiest vectors include web hacking and email attacks , but they will move to IoT as computers and operating systems get more secure . Printers are low-hanging fruit , he says , and easier to target . He also recommends isolating printers on local networks , separate from PCs , and disabling out-of-network communication so even if they 're hacked , printers ca n't interact with adversaries outside the organization . Wingate suggests adopting the same baseline security practices businesses employ for computers ; for example , periodically update passwords so sensitive content is n't left in the open for people to steal . He also recommends intrusion detection , another practice people use for their PCs but do n't frequently employ on printers .