Tuesday, July 8th, 2008
Cybercriminals are exploiting a bug in software used by Microsoft's Access database program in a new online attack, Microsoft warned Monday.The flaw lies in the Snapshot Viewer ActiveX control, which ships with "all supported versions of Microsoft Office Access except Microsoft Access 2007," Microsoft said in a security advisory, published ...
Posted in Security, Software, Windows | No Comments
Monday, July 7th, 2008
Some new statistics just came out regarding Browser Security, this is more in terms of which users are most likely to apply patches and be using the most secure version.I would have thought Firefox would have been pretty high since the newer series prompt automatically new patches. My only guess ...
Posted in Internet, Privacy, Security, Software | No Comments
Wednesday, July 2nd, 2008
Internet Explorer's getting a little bit safer. Microsoft Wednesday unveiled significant new security features that will be in the next version of the company's Web browser, Internet Explorer 8, currently in public beta testing.
From Microsoft's standpoint, any improvement in security is a plus, and the company seems to be taking ...
Posted in Coding, Internet, Privacy, Security, Windows | No Comments
Wednesday, July 2nd, 2008
Updated your Web browser lately? Ever? If not, you and 637 million other Net surfers with outdated, insecure browsers are inviting criminal hackers into your computer, researchers warn.Using Internet Explorer? You're likely to be one of the biggest offenders.The researchers wanted to know why so many recent attacks have been ...
Posted in Internet, Privacy, Security, Software | No Comments
Tuesday, July 1st, 2008
Our research team has identified a web-based attack technique that exploits the growing number of applications that require a web server being run on a local machine. Cross-Environment Hopping (CEH) is a result of this trend combined with the current limitations in browsers’ same-origin policy access restrictions.
The CEH technique enables ...
Posted in Coding, Internet, Networking, Privacy, Security | No Comments