Email Alerts
-
Dangerous Java flaws could expose sensitive data
Errors in Sun Java could be exploited by an attacker to bypass security, gain access to critical files or conduct a denial-of-service attack. Article
-
Microsoft to patch critical Windows, Excel flaws
In its advance notification, Microsoft said it plans to patch six critical flaws in Windows, Internet Explorer, Excel, Visual Basic and Word. Article
-
Microsoft flaw reveals inefficient security model
As Executive Editor Dennis Fisher explains, attackers have already won the battle. Column
-
Microsoft learns of successful RPC worm infections
Microsoft said a number of customers are infected with worms that successfully exploit the RPC flaw and download malware. Article
-
Web app attacks grow, but developers may fight back
Web application security expert Ryan Barnett would like to see every company use a Web application firewall. But Barnett, director of security at Web application firewall vendor Breach Security Inc., knows that companies need to use more than just fi... Interview
-
Critical SAP flaw leaves systems vulnerable to attack
A flaw in SAP's graphical user interface could be exploited by an attacker to gain user privileges and access data and files. Article
-
Inside MSRC: Microsoft addresses XML Core Services flaw, RPC flaw
Microsoft's Bill Sisk highlight's the software maker's latest bulletin release and updates readers on the MS08-067 out-of-band release. Column
-
Microsoft patches critical XML Core Services flaw
The critical Microsoft flaw could be exploited by an attacker to remotely execute code and gain access to critical data. Article
-
Attackers target critical Adobe PDF flaw
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Adobe Reader to hijack computer systems. Article
-
Microsoft to patch critical Windows flaw
Microsoft plans to release a security update for a flaw in XML Core Services that affects versions of Windows 2000, Windows XP, Windows Vista and Windows Server 2003 and 2008. Article
Security Management Strategies for the CIO