Email Alerts
-
Inside MSRC: Microsoft issues guidance on critical flaws
Microsoft's Bill Sisk describes the latest bulletins and explains why new threat families were added to the Malicious Software Removal tool. Column
-
Microsoft fixes critical flaws in Office, IE
Dangerous flaws could allow an attacker to access sensitive files and gain complete control of a computer. More than two dozen flaws were patched. Article
-
Dangerous Java flaws could expose sensitive data
Errors in Sun Java could be exploited by an attacker to bypass security, gain access to critical files or conduct a denial-of-service attack. Article
-
Microsoft to patch critical Windows, Excel flaws
In its advance notification, Microsoft said it plans to patch six critical flaws in Windows, Internet Explorer, Excel, Visual Basic and Word. Article
-
Microsoft flaw reveals inefficient security model
As Executive Editor Dennis Fisher explains, attackers have already won the battle. Column
-
Microsoft learns of successful RPC worm infections
Microsoft said a number of customers are infected with worms that successfully exploit the RPC flaw and download malware. Article
-
Web app attacks grow, but developers may fight back
Web application security expert Ryan Barnett would like to see every company use a Web application firewall. But Barnett, director of security at Web application firewall vendor Breach Security Inc., knows that companies need to use more than just fi... Interview
-
Inside MSRC: Microsoft addresses XML Core Services flaw, RPC flaw
Microsoft's Bill Sisk highlight's the software maker's latest bulletin release and updates readers on the MS08-067 out-of-band release. Column
-
Critical SAP flaw leaves systems vulnerable to attack
A flaw in SAP's graphical user interface could be exploited by an attacker to gain user privileges and access data and files. Article
-
Microsoft patches critical XML Core Services flaw
The critical Microsoft flaw could be exploited by an attacker to remotely execute code and gain access to critical data. Article
Security Management Strategies for the CIO