Sunday, April 27th, 2014
Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11.
The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses ...
Posted in Internet, Security, Windows | No Comments
Tuesday, March 25th, 2014
It’s been well publicized that on April 8th, 2014 Microsoft discontinues product support for Windows XP. Released in 2001, the support policy for the life of Windows XP soon followed in October 2002. In September 2007, we announced that support for Windows XP would be extended an additional two years ...
Posted in Internet, Privacy, Security, Windows | No Comments
Friday, March 14th, 2014
Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000.
A team from French vulnerability research firm Vupen hacked Google Chrome by exploiting a use-after-free vulnerability ...
Posted in Internet, Privacy, Security, Software, Windows | No Comments
Thursday, February 20th, 2014
Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto.
In its 2013 Microsoft Vulnerabilities Study, Avecto found that you could ...
Posted in Internet, Privacy, Security, Windows | No Comments
Thursday, February 13th, 2014
FireEye Labs has identified a new Internet Explorer (IE) zero-day exploit hosted on a breached website based in the U.S. It’s a brand new zero-day that targets IE 10 users visiting the compromised website–a classic drive-by download attack. Upon successful exploitation, this zero-day attack will download a XOR encoded payload ...
Posted in Internet, Security, Windows | No Comments
Page 2 of 15«12345...10...»Last »