Microsoft
Fake Microsoft security update carries Autorun worm
An e-mail supposedly coming from Microsoft and urging the recipients to update their Windows has started making rounds yesterday: There are a lot of people out there who will …
All versions of Internet Explorer under threat
Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …
Tracking protection lists for Internet Explorer 9
Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …
Malicious .rtf file exploits MS Office flaw
A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted …
Microsoft patches record 40 vulnerabilities
Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This …
New book: Troubleshooting Windows 7 Inside Out
You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …
Windows 0-day circumvents UAC
Windows zero-day vulnerabilities are lately getting discovered too often for Microsoft’s – and users’ – liking. Unfortunately for all of us, details of …
Vulnerability assessment for Microsoft SQL Azure
Sentrigo announced Repscan 4.0 which offers expanded support for cloud-based and open source database platforms, productivity enhancements for database administrators (DBAs) …
Microsoft November Patch Tuesday bottom line
In the video below, Amol Sarwate, vulnerability labs manager at Qualys discusses this month’s Microsoft Patch Tuesday release. To learn more about patching challenges …
Microsoft contemplating SSL for Bing
HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …
Tool to test regular expressions for DoS vulnerabilities
Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can …
Microsoft’s Network compromised, used to route traffic to spam websites
Microsoft has confirmed that two network devices on its network have indeed been compromised and were being used by criminals to route traffic to more than a thousand websites …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD