Email Alerts
-
Microsoft to patch critical flaws in Office, SQL Server
Four critical patches address flaws in Office and SQL Server. Article
-
Microsoft Baseline Security Analyzer: Do updates offer improved Windows security?
The Microsoft Baseline Security Analyzer has always been useful at scanning Windows environments for the presence or absence of security updates. Now, see how the latest version adds support for Windows Vista and Windows Server 2008 to its bag of tri... Tip
-
Inside MSRC: Microsoft addresses critical Snapshot Viewer flaw
Microsoft's Bill Sisk reviews the Microsoft Access Snapshot Viewer flaw and explains why a Media Player bulletin was missing in this month's batch of patches. Column
-
Microsoft patches critical Access, Excel flaws
A flaw in the Microsoft Access Snapshot Viewer being actively exploited by attackers has been plugged in Microsoft's latest round of patches. Article
-
Microsoft to issue seven critical August patches
The software giant's monthly patch release next week will feature a dozen patches, including seven rated as critical for Windows, Internet Explorer and Office. News
-
Microsoft to revamp patching, add exploitability index
Microsoft plans to give some security vendors early access to vulnerability information prior to the patch release. Article
-
Valuable lesson emerges from DNS flaw handling
Any effort to prevent others in the legitimate security community from working out the problem is a waste of time. Column
-
Oracle releases 45 database, application fixes
Oracle released updates to repair dozens of flaws across its product line as part of its quarterly Critical Patch Update. Article
-
Inside MSRC: Microsoft issues guidance on DNS server update
Microsoft's Bill Sisk of the Microsoft Security Response Center said the DNS client and server updates should be applied carefully to avoid impairing the operating system. Column
-
Microsoft issues DNS, SQL Server updates
Four security bulletins address a DNS server spoofing vulnerability and a flaw in SQL Server that could allow an elevation of privilege of an authenticated attacker. Article
Security Management Strategies for the CIO