Microsoft
Some Flame modules were signed with rogue Microsoft certificates
While investigating the recently unearthed Flame (SkyWiper) toolkit, Microsoft’s researchers have made an unwelcome discovery. “We have discovered through our …
IE10 will have “Do Not Track” on by default
As Microsoft released the preview of the next version of its Internet Explorer browser, news that in Windows 8 the browser will be sending a “Do Not Track” signal …
Top 10 patching hurdles and how to overcome them
Patching is the most effective, efficient and simple method to mitigate malware, worms and viruses. It may not protect against advance attacks that make use of 0-day …
Instant decryption of MS Office 2010 documents now possible
Passware announced Passware Kit Forensic 11.7, which includes live memory analysis and subsequent decryption of MS Word or Excel 2007-2010 files. In addition, the new version …
Microsoft embraces CVRF format for its security bulletins
A year has passed since the Industry Consortium for Advancement of Security on the Internet (ICASI) introduced the first version of the Common Vulnerability Reporting …
Manage Windows event logs with Event Log Explorer
FSPro Labs released Event Log Explorer 4, designed to view, monitor and analyze events recorded in Security, System, Application and other logs of Microsoft Windows operating …
Inside Windows Debugging
Rethink your use of Windows debugging and tracing tools, and use Inside Windows Debugging to learn how to make them a key part of test-driven software development. Led by a …
Microsoft shows cloud computing security benefits
Small and midsize businesses (SMBs) are gaining significant IT security benefits from using the cloud, according to a new Microsoft study in five geographies. The study shows …
Microsoft releases seven security updates
This month, Microsoft released seven bulletins, three critical and four important, that addressed a total of 23 vulnerabilities. MS12-029 is the bulletin that should be …
Microsoft to release seven bulletins, three critical
The Microsoft Security Bulletin Advance Notification for May 2012 contains 7 bulletins: three rated “critical” and the rest “important.” Just when most …
Microsoft names source of RDP code leak
Microsoft confirmed that, as speculated months ago, the RDP PoC exploit was sourced from China. It was apparent that the exploit originated in the West as researchers noticed …
Security and Privacy for Microsoft Office 2010 Users
Take control and put the built-in security and privacy features in Microsoft Office to work. Whether downloading documents, publishing a presentation, or collaborating online …