Email Alerts
-
Adobe issues warning for Linux users
A dangerous flaw in Adobe Flash Player for Linux could allow an attacker to take control of an affected system. Article | 19 Dec 2008
-
Microsoft issues emergency patch to fix IE flaw
The software giant repaired a dangerous flaw being exploited if a user browses some legitimate websites. Article | 17 Dec 2008
-
Microsoft fixes critical flaws in Office, IE
Dangerous flaws could allow an attacker to access sensitive files and gain complete control of a computer. More than two dozen flaws were patched. Article | 09 Dec 2008
-
Inside MSRC: Microsoft issues guidance on critical flaws
Microsoft's Bill Sisk describes the latest bulletins and explains why new threat families were added to the Malicious Software Removal tool. Column | 09 Dec 2008
-
Dangerous Java flaws could expose sensitive data
Errors in Sun Java could be exploited by an attacker to bypass security, gain access to critical files or conduct a denial-of-service attack. Article | 04 Dec 2008
-
Microsoft to patch critical Windows, Excel flaws
In its advance notification, Microsoft said it plans to patch six critical flaws in Windows, Internet Explorer, Excel, Visual Basic and Word. Article | 04 Dec 2008
-
Microsoft flaw reveals inefficient security model
As Executive Editor Dennis Fisher explains, attackers have already won the battle. Column | 03 Dec 2008
-
Microsoft learns of successful RPC worm infections
Microsoft said a number of customers are infected with worms that successfully exploit the RPC flaw and download malware. Article | 01 Dec 2008
-
Web app attacks grow, but developers may fight back
Web application security expert Ryan Barnett would like to see every company use a Web application firewall. But Barnett, director of security at Web application firewall vendor Breach Security Inc., knows that companies need to use more than just fi... Interview | 26 Nov 2008
-
Microsoft patches critical XML Core Services flaw
The critical Microsoft flaw could be exploited by an attacker to remotely execute code and gain access to critical data. Article | 11 Nov 2008
Security Management Strategies for the CIO