Please turn on your JavaScript for this page to function normally.
Top 10 patching hurdles and how to overcome them

Patching is the most effective, efficient and simple method to mitigate malware, worms and viruses. It may not protect against advance attacks that make use of 0-day …

Instant decryption of MS Office 2010 documents now possible

Passware announced Passware Kit Forensic 11.7, which includes live memory analysis and subsequent decryption of MS Word or Excel 2007-2010 files. In addition, the new version …

Microsoft embraces CVRF format for its security bulletins

A year has passed since the Industry Consortium for Advancement of Security on the Internet (ICASI) introduced the first version of the Common Vulnerability Reporting …

Manage Windows event logs with Event Log Explorer

FSPro Labs released Event Log Explorer 4, designed to view, monitor and analyze events recorded in Security, System, Application and other logs of Microsoft Windows operating …

Inside Windows Debugging

Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …

Microsoft shows cloud computing security benefits

Small and midsize businesses (SMBs) are gaining significant IT security benefits from using the cloud, according to a new Microsoft study in five geographies. The study shows …

Microsoft releases seven security updates

This month, Microsoft released seven bulletins, three critical and four important, that addressed a total of 23 vulnerabilities. MS12-029 is the bulletin that should be …

Microsoft to release seven bulletins, three critical

The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated “critical” and the rest “important.” Just when most …

Microsoft names source of RDP code leak

Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …

Security and Privacy for Microsoft Office 2010 Users

Take control and put the built-in security and privacy features in Microsoft Office to work. Whether downloading documents, publishing a presentation, or collaborating online …

Hotmail remote password reset 0-day bug found, patched

A critical security flaw affecting Microsoft’s Hotmail has been detected almost simultaneously by Vulnerability Lab researchers and a Saudi Arabia hacker and, until a …

The Conficker threat and the reality of targeted attacks

The Conficker worm is still one of the biggest ongoing threats to enterprises, says Microsoft. According to the newly released Microsoft Security Intelligence Report volume …

Don't miss

Cybersecurity news