Email Alerts
-
Inside MSRC: Microsoft addresses XML Core Services flaw, RPC flaw
Microsoft's Bill Sisk highlight's the software maker's latest bulletin release and updates readers on the MS08-067 out-of-band release. Column
-
Critical SAP flaw leaves systems vulnerable to attack
A flaw in SAP's graphical user interface could be exploited by an attacker to gain user privileges and access data and files. Article
-
Attackers target critical Adobe PDF flaw
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Adobe Reader to hijack computer systems. Article
-
Adobe issues warning for Reader, Acrobat flaws
Flaws in Adobe Reader 8 and Acrobat 8 could cause the applications to crash and a hacker to gain access to an affected system. Article
-
Adobe issues patch for critical PageMaker flaws
Flaws in Adobe PageMaker could allow a hacker to take control of an affected system. Article
-
Can virtualized applications interact without permission?
If a guest OS in a virtualized system is compromised, it could theoretically go through the hypervisor layer and compromise the rest of the guest operating systems. But what about an environment with virtualized applications? Ask the Expert
-
What is the best way to manually test for buffer overflows?
There are two ways of reviewing a program for buffer overflows. Michael Cobb explains how to examine a program's source code and file code. Ask the Expert
-
Oracle releases 45 database, application fixes
Oracle released updates to repair dozens of flaws across its product line as part of its quarterly Critical Patch Update. Article
-
Hacker toolkit targets Microsoft Access zero-day
Symantec Corp. is warning that more users of Microsoft Access could be targeted by attackers using the Neosploit exploit toolkit. Article
-
Microsoft Word zero-day being actively exploited
Attackers are actively targeting a flaw in Microsoft Word, according to Symantec. Article
Security Management Strategies for the CIO