CIS Logo
tagline: Confidence in the Connected World


When purchasing online this holiday season - and all year long - keep these tips in mind to help minimize your vulnerability to cyberattacks.


Multiple vulnerabilities have been discovered in Xcode, iTunes, and iCloud.



A use-after-free vulnerability has been discovered in Adobe Flash Player that could allow for code execution, potentially allowing an attacker to take control of the affected system.



Multiple vulnerabilities have been discovered in Joomla, the most severe of which could allow for security bypass.



Multiple vulnerabilities have been discovered in OS X, Safari, watchOS, tvOS, and iOS.



Multiple vulnerabilities in Adobe Acrobat and Adobe Reader could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Oracle products, which could allow an attacker to take complete control of an affected system.



Tech support scams have been around for years: you answer the phone and the person on the other end claims to be working with a well-known tech company.


Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow an attacker to execute arbitrary code, with failed exploit attempts potentially leading to denial of service conditions.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could result in remote code execution.



A vulnerability has been discovered in Microsoft Video Control, which could result in remote code execution if the user opens a specially crafted file, application, webpage or email message.



A vulnerability has been discovered in Microsoft Office, which could result in remote code execution if the user opens a specially crafted Rich Text File (“.



Multiple vulnerabilities have been discovered in Microsoft Graphics Component, which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Microsoft Edge, the most severe of which could allow remote code execution if a user views a specially crafted web page.



Multiple vulnerabilities have been discovered in Microsoft Internet Explorer, the most severe of which could allow remote code execution if a user views a specially crafted web page.



1 57 58 59 60 61 83