Microsoft said it plans to address four critical bulletins for vulnerabilities in Office on its upcoming patch day March 11.In a security bulletin, Microsoft said Thursday there are four critical remote code execution flaws in Office, which is regularly under attack.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
We all remember code red, right? Come on, you know you were hit with it...
Amid all the hubbub about the first beta of IE 8 the security features haven't gotten a lot of attention. Part of the problem is that Microsoft hasn't disclosed a lot, but it does appear that the browser will block malware.
If your company or organization runs an enterprise wireless LAN network, I have some troubling news for you. Odds are high that your current "enterprise-class" wireless LAN deployment is vulnerable to authentication leakage which not only exposes your internal network but all of your server access controls.
Google's Android SDK is facing multiple vulnerabilities that are remotely exploitable, according to Core Security Technologies.In an advisory, Core Security noted heap and interflow overflow issues with Android and reserved eight CVE identifiers.
I've recently seen a great Black Hat presentation by Felix (FX) Lindner (see pic 2) and a blog posting by Petko D. Petkov (PDP) (see pic 1) on the subject of hacking routers.
A PayPal executive last week recommended that its users ditch Apple's Safari browser since it doesn't have anti-phishing technology. If other phishing targets--banks, brokers and such--follow suit it could make anti-phishing technology the price of admission to recommend browsers.
I recently attended the eBay Red Team event at the eBay campus in San Jose, CA. and got a chance to sit in on several presentations, meetings, and discussions aimed at creating security awareness and knowledge sharing opportunities for several major decision makers in the information security space.
In the security industry it's not hard to run into someone predicting the demise of the anti-virus industry. But the end game will take forever to play out.
Consider this, Microsoft spends huge amounts of dollars and manpower creating protections for the Vista operating system, yet we still have old school vulnerabilities. Why?