Please turn on your JavaScript for this page to function normally.
Tracking protection lists for Internet Explorer 9

Microsoft recently announced that IE9 will enable users to import independently curated lists of third party domains, which can be blocked or allowed access to a user’s …

Malicious .rtf file exploits MS Office flaw

A stack-based buffer overflow vulnerability in Microsoft Office has recently been spotted being exploited in the wild by attackers aiming at getting control of targeted …

Microsoft patches record 40 vulnerabilities

Today Microsoft released 17 security bulletins which address 40 vulnerabilities affecting Microsoft Office, Windows, Internet Explorer, SharePoint Server and Exchange. This …

New book: Troubleshooting Windows 7 Inside Out

You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …

Windows 0-day circumvents UAC

Windows zero-day vulnerabilities are lately getting discovered too often for Microsoft’s – and users’ – liking. Unfortunately for all of us, details of …

Vulnerability assessment for Microsoft SQL Azure

Sentrigo announced Repscan 4.0 which offers expanded support for cloud-based and open source database platforms, productivity enhancements for database administrators (DBAs) …

Microsoft November Patch Tuesday bottom line

In the video below, Amol Sarwate, vulnerability labs manager at Qualys discusses this month’s Microsoft Patch Tuesday release. To learn more about patching challenges …

Microsoft contemplating SSL for Bing

HTTP session hijacking as a possibility and tools to execute it have been around for more than half a decade, but it took an easy-to-use Firefox add-on like Firesheep to point …

Tool to test regular expressions for DoS vulnerabilities

Regular expression patterns containing certain clauses that execute in exponential time (for example, grouping clauses containing repetition that are themselves repeated) can …

Microsoft’s Network compromised, used to route traffic to spam websites

Microsoft has confirmed that two network devices on its network have indeed been compromised and were being used by criminals to route traffic to more than a thousand websites …

49 vulnerabilities fixed in record Patch Tuesday

In today’s mammoth Patch Tuesday, Microsoft delivers 16 security bulletins that address 49 vulnerabilities affecting Windows, Internet Explorer, Microsoft Office, and …

Are computer “health certificates” the answer for the botnet problem?

Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …

Don't miss

Cybersecurity news