Please turn on your JavaScript for this page to function normally.
Fake Microsoft security update carries Autorun worm

An e-mail supposedly coming from Microsoft and urging the recipients to update their Windows has started making rounds yesterday: There are a lot of people out there who will …

All versions of Internet Explorer under threat

Today Microsoft released a new security advisory to help protect users from a vulnerability affecting Internet Explorer versions 6, 7, and 8. Exploiting this vulnerability …

Tracking protection lists for Internet Explorer 9

Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …

Malicious .rtf file exploits MS Office flaw

A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted …

Microsoft patches record 40 vulnerabilities

Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This …

New book: Troubleshooting Windows 7 Inside Out

You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …

Windows 0-day circumvents UAC

Windows zero-day vulnerabilities are lately getting discovered too often for Microsoft’s – and users’ – liking. Unfortunately for all of us, details of …

Vulnerability assessment for Microsoft SQL Azure

Sentrigo announced Repscan 4.0 which offers expanded support for cloud-based and open source database platforms, productivity enhancements for database administrators (DBAs) …

Microsoft November Patch Tuesday bottom line

In the video below, Amol Sarwate, vulnerability labs manager at Qualys discusses this month’s Microsoft Patch Tuesday release. To learn more about patching challenges …

Microsoft contemplating SSL for Bing

HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …

Tool to test regular expressions for DoS vulnerabilities

Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can …

Microsoft’s Network compromised, used to route traffic to spam websites

Microsoft has confirmed that two network devices on its network have indeed been compromised and were being used by criminals to route traffic to more than a thousand websites …

Don't miss

Cybersecurity news