Email Alerts
-
Flaw disclosure debate polarizes SOURCE Boston panel
Security researchers and vendors tackle the issue of full and partial disclosure of vulnerability information during a panel discussion at the SOURCE Boston conference. Article | 12 Mar 2009
-
Adobe issues patch to block zero-day flaw
The latest version of Adobe Acrobat Reader corrects a critical image handling flaw being actively exploited in the wild. Article | 10 Mar 2009
-
Microsoft patches critical Windows kernel flaw
A critical flaw in the Windows graphics rendering component could be exploited by an attacker to gain access to sensitive data and take control of a machine. Article | 10 Mar 2009
-
Adobe updates Flash Player to fix clickjacking, buffer overflow flaws
Flaws in Adobe Flash Player could be used by an attacker to gain access to system files and take control of a computer. Adobe recommends updating to the latest version. Article | 25 Feb 2009
-
Sourcefire issues Adobe zero-day patch to block attacks
"Home brew patch," blocks attempts by hackers to exploit an unpatched buffer overflow vulnerability in Adobe Reader 9. Article | 24 Feb 2009
-
Adobe zero-day threat limited so don't panic
Malicious PDF files are spreading slowly and are extremely targeted. News | 24 Feb 2009
-
Coalition forms to battle Microsoft worm attack, $250K reward offered
A coalition of more than a dozen organizations is working together to fend off the potential damage posed by the Conficker/Downadup worm. Article | 12 Feb 2009
-
Microsoft fixes critical IE 7, Exchange flaws
Memory corruption errors in IE 7 and a message processing error in Exchange leave systems vulnerable to attack, Microsoft said. Article | 10 Feb 2009
-
Inside MSRC: Microsoft foldout explains IE, Exchange patches
Microsoft's Bill Sisk describes this month's batch of patches, including a SQL Server and Exchange update that will require a reboot. Column | 10 Feb 2009
-
Microsoft to patch serious IE, Exchange Server flaws
Flaws in Internet Explorer and Microsoft Exchange Server can be remotely exploited by an attacker. Article | 05 Feb 2009
Security Management Strategies for the CIO