Apple has released AirPort Base Station Firmware Update 7.7.3, which is recommended for all AirPort Extreme and AirPort Time Capsule base stations with 802.11ac. Related to the recently exposed Heartbleed bug (see “The Normal Person’s Guide to the Heartbleed Vulnerability,” 9 April 2014), the firmware update fixes an OpenSSL vulnerability that was exposed when the Back to My Mac feature was turned on. After updating the firmware, you may need to re-enable Back to My Mac using AirPort Utility and your Mac’s System Preferences. You must update your AirPort base station using AirPort Utility on your Mac or an iOS device with the free AirPort Utility app installed (the download isn’t available via the Apple Support Web page or Software Update).
Trust Local Addresses in VirusBarrier X6's Antivandal
VirusBarrier X6's Antivandal feature stops all kinds of network attacks, including port scans, ping floods and more. However, you may have some devices on your network that send out pings or other requests that may be interpreted as attacks. To prevent this, add them to the Trusted Addresses list so they won't be blocked. You can even add a range of addresses with wildcards, such as 192.168.1.*.
AirPort Base Station Firmware Update 7.7.3
Put your company and products in front of tens of thousands of
savvy, committed Apple users who actually buy stuff.
More information: <http://tidbits.com/advertising.html>