Feeds

Patch Tuesday - and other days of the week

Viral Wednesday

  • alert
  • submit to reddit

Seven Steps to Software Security

Industry comment Back in the mists of the past, people gave names to the days of the week. Some of these have survived in the names of our modern weekdays. Monday is Moon Day, Thursday is named after the Norse storm god Thor and the roman god Saturn is remembered every Saturday.

We think this is a great idea and should be revived. People must agree with this as they have already started with the first name: today is Patch Tuesday. Looking through the past year or so we can see that there are some names for the other days of this week almost which are almost choosing themselves.

Worrying Monday

The day before patch Tuesday when all an administrator has is a worrying snippet of information about the patches that are soon to be released. Will they have to scramble to close a vulnerability in their enterprise? They have to wait and see.

Patch Tuesday

We think enough has been said about this one.

Viral Wednesday

With 24 hours gone since the release of the patches and details of the vulnerabilities being fix out in the open, Malware writers have a field day. New exploits and Trojans pour onto the internet hoping to catch people before they can close any of the holes that weren’t already being used to attack systems.

Vulnerable Thursday

Now the excitement of Patch Tuesday is past, those niggling little vulnerabilities that researchers have been sitting on can be publicly disclosed, safe in the knowledge that there is a month for any exploitation to do damage before the next round of patches.

Rollback Friday

The first administrators and users to patch their systems will now be discovering which patch is the dud this month. Maybe it was the patch documentation that wasn’t quite complete or perhaps a bug in the patch itself. Either way, a patch to fix one vulnerability has stopped something unrelated from working, or worse still, it has opened a wholly new vulnerability. ®

Martin Ingram is VP of product management at AppSense.

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.