Email Alerts
-
Google tries to nurture culture of security
By design, Google's security team is primarily composed of engineers, the search engine giant's security director noted during an interview at RSA Conference 2008. Article | 08 Apr 2008
-
Microsoft warns of actively exploited Word flaw
Microsoft is investigating active attacks on a database engine vulnerability being exploited through malicious Word documents. Article | 24 Mar 2008
-
Application hardening tools help repel software pirates
Application hardening vendors can make life difficult for software pirates, forcing them to turn to more profitable, low-hanging fruit. Article | 20 Mar 2008
-
Microsoft patches 12 Office flaws with critical updates
Attackers could take complete control of machines running versions of Microsoft Office, the software giant warned Tuesday. Four critical updates were released to fix 12 flaws. Article | 11 Mar 2008
-
Inside MSRC: Microsoft Excel patches plug serious phishing risk
Microsoft's Bill Sisk explains why a number of vulnerabilities in Excel should be patched to reduce the risk of dangerous phishing attacks. Column | 11 Mar 2008
-
Microsoft warns of Excel zero-day flaw
Attackers are actively exploiting a zero-day flaw in Microsoft's Excel spreadsheet program, and users are being warned not to open files sent from unknown and untrusted sources. Article | 16 Jan 2008
-
McAfee plugs flaw
McAfee's E-Business Server contains a flaw that could be exploited to cause a DoS attack. Article | 10 Jan 2008
-
Exploit code targets RealPlayer, researchers warn
A zero-day flaw in the latest version of RealPlayer can be actively targeted with working exploit code, according to researchers at US-CERT. Article | 02 Jan 2008
-
Apple updates QuickTime to plug serious flaw
Apple worked quickly to address the zero-day buffer-overflow flaw in its widely used QuickTime media player, becuase exploit code surfaced late last month. Article | 14 Dec 2007
-
Exploit code targets Apple QuickTime zero-day
Several security organizations have noted the appearance of exploit code against a zero-day buffer-overflow flaw in Apple's widely used QuickTime media player. Article | 26 Nov 2007
Security Management Strategies for the CIO