Email Alerts
-
Adobe issues warning for Reader, Acrobat flaws
Flaws in Adobe Reader 8 and Acrobat 8 could cause the applications to crash and a hacker to gain access to an affected system. Article
-
Microsoft releases Windows patch to stop worm attack
Microsoft issued an out of cycle update, plugging a dangerous hole that could be used to craft a worm attack. Article
-
Microsoft to release urgent security patch
Microsoft said it plans to release a critical security update out of its normal patching cycle to plug a hole that affects Windows 2000, XP, and Windows Server 2003. Article
-
Adobe addresses clickjacking in latest Flash Player
Adobe issued Flash Player 10, blocking ongoing clickjacking attacks and also preventing attackers from manipulating a user's clipboard. Article
-
Oracle patches dangerous WebLogic flaw, critical database holes
A severe WebLogic flaw is among 36 security fixes released by Oracle Corp. across its database, middleware and enterprise software products. Article
-
Inside MSRC: Microsoft issues advice for critical server flaws
Microsoft's Bill Sisk explains the critical flaws affecting the Host Integration and Windows 2000 servers, and introduces the new Microsoft Active Protections Program (MAPP) and Exploitability Index. Column
-
Microsoft patches Active Directory, Internet Explorer flaws
Microsoft patched dangerous holes in implementations of Active Directory on Windows 2000 Server and memory allocation issues with its Host Integration Server. Article
-
Eleven patches due from Microsoft
Microsoft patches include critical updates for IE, Active Directory, Excel and Host Integration Server to fix vulnerabilities that could cause a remote code execution hack attack. Article
-
Microsoft plugs Media Player, graphics handling flaws
Flaws in Microsoft's Graphics Device Interface could affect multiple systems and third party applications, Microsoft said. Article
-
Microsoft provides guidance on GDI flaws
Microsoft's Bill Sisk explains why five remote code execution vulnerabilities in GDI+ affect multiple systems and third-party applications. Column
Security Management Strategies for the CIO