“.... Bradley Antis, vice president of technical strategy at Orange, Calif.-based M86 Security, [siad] the 15 software vulnerabilities that were most often exploited in the second half of 2010 could have been stopped dead in their tracks — all already had been patched by their vendors.... The vulnerabilities continued to spread only because countless PC users didn’t bother to update their software, leaving enough unpatched machines on the Internet to allow the exploits to thrive."
http://www.securitynewsdaily.com/best-way-avoid-virus-infection-update-software-0685/ Apparently, Epsilon did not get the memo. _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
