Email Alerts
-
Microsoft patches Active Directory, Internet Explorer flaws
Microsoft patched dangerous holes in implementations of Active Directory on Windows 2000 Server and memory allocation issues with its Host Integration Server. Article | 14 Oct 2008
-
Eleven patches due from Microsoft
Microsoft patches include critical updates for IE, Active Directory, Excel and Host Integration Server to fix vulnerabilities that could cause a remote code execution hack attack. Article | 10 Oct 2008
-
Microsoft plugs Media Player, graphics handling flaws
Flaws in Microsoft's Graphics Device Interface could affect multiple systems and third party applications, Microsoft said. Article | 09 Sep 2008
-
Microsoft provides guidance on GDI flaws
Microsoft's Bill Sisk explains why five remote code execution vulnerabilities in GDI+ affect multiple systems and third-party applications. Column | 09 Sep 2008
-
Microsoft to patch critical flaws in Office, SQL Server
Four critical patches address flaws in Office and SQL Server. Article | 04 Sep 2008
-
Microsoft patches critical Access, Excel flaws
A flaw in the Microsoft Access Snapshot Viewer being actively exploited by attackers has been plugged in Microsoft's latest round of patches. Article | 12 Aug 2008
-
Inside MSRC: Microsoft addresses critical Snapshot Viewer flaw
Microsoft's Bill Sisk reviews the Microsoft Access Snapshot Viewer flaw and explains why a Media Player bulletin was missing in this month's batch of patches. Column | 12 Aug 2008
-
Microsoft to issue seven critical August patches
The software giant's monthly patch release next week will feature a dozen patches, including seven rated as critical for Windows, Internet Explorer and Office. News | 07 Aug 2008
-
Microsoft to revamp patching, add exploitability index
Microsoft plans to give some security vendors early access to vulnerability information prior to the patch release. Article | 05 Aug 2008
-
Valuable lesson emerges from DNS flaw handling
Any effort to prevent others in the legitimate security community from working out the problem is a waste of time. Column | 22 Jul 2008
Security Management Strategies for the CIO