Email Alerts
-
Microsoft patches WebDAV security vulnerability in bevy of updates
Zero-day flaws in Microsoft Internet Information Services (IIS) Web server and Internet Explorer were among 31 vulnerabilities repaired Tuesday. Article | 09 Jun 2009
-
Microsoft plans 10 security updates, fixing IE, Word, Excel vulnerabilities
The software giant plans to issue six critical bulletins repairing flaws in Internet Explorer, Word, Excel and Office. Article | 04 Jun 2009
-
Adobe shifts to Microsoft patching process, incident response plan
Adobe Systems Inc. said it would bolster its patch management strategy, issuing quarterly updates for its adobe Reader and Acrobat PDF software. Article | 21 May 2009
-
Microsoft updates Office to address serious PowerPoint vulnerabilities
One of the PowerPoint zero-day flaws was being actively targeted by attackers. Article | 12 May 2009
-
Software delivery could fix software patching issues
When was the last time you considered the state of your vendor relationship? Are they doing anything behind your back? News | 12 May 2009
-
Microsoft to patch critical PowerPoint zero-day flaw
Attackers are actively targeting a remote code execution vulnerability in PowerPoint to take complete control of an affected system. Article | 07 May 2009
-
Firefox update addresses several security flaws
Mozilla's latest browser release repairs a critical vulnerability that could have been exploited to run arbitrary code. Article | 22 Apr 2009
-
Microsoft patches serious Excel zero-day, Windows flaws
Microsoft is patching flaws in Excel and WordPad that are reportedly being actively exploited in the wild and could allow an attacker to gain access to sensitive data. Article | 14 Apr 2009
-
Oracle issues 43 updates, fixes serious database flaws
Oracle's quarterly Critical Patch Update contained patches for 16 database flaws and dozens of others correcting errors in Oracle Application Server and its BEA product line. Article | 14 Apr 2009
-
HP patches critical OpenView flaws
The remote network software contains flaws that could be exploited to gain access to critical files. Article | 24 Mar 2009
Security Management Strategies for the CIO