Blog Posts Tagged with "Microsoft"

69dafe8b58066478aea48f3d0f384820

Microsoft and Law Enforcement Hit Zeus Botnet Servers

March 26, 2012 Added by:Headlines

"With this legal and technical action, a number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

ICS-CERT: Windows Remote Desktop Protocol Vulnerability

March 20, 2012 Added by:Infosec Island Admin

ICS-CERT is aware of a public report of a Remote Desktop Protocol (RDP) vulnerability, which with successful exploitation in the control systems environment could lead to system processes freezing and potentially allow remote code execution...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Waledac Spam Botnet Evolves into Password Sniffer

February 20, 2012 Added by:Headlines

Researchers form Palo Alto Networks have detected a new variation of the briefly defeated Waledac spamming botnet, but this version is able to sniff out login credentials for several email protocols as well as files with the .dat extension related to BitCoin and FTP...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Issues Updates for Multiple Product Vulnerabilities

February 15, 2012 Added by:Headlines

Microsoft released updates to address vulnerabilities in Windows, Internet Explorer, Microsoft .NET Framework, Silverlight, Office, and Microsoft Server Software that could allow attackers to execute arbitrary code, cause a denial of service, or gain unauthorized access...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Tenth Anniversary of Gates Trustworthy Computing Memo

January 27, 2012 Added by:Fergal Glynn

January 15th was the 10th anniversary of Gates Trustworthy Computing memo. I asked a mixed group of my colleagues at Veracode to answer this question. The group has a wide age range, and come from many different backgrounds. Some of the answers are really funny. I hope you enjoy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US CERT: Hash Table Collision Attack Vulnerability

January 04, 2012 Added by:Headlines

US-CERT is aware of reports stating that multiple programming language implementations, including web platforms, are vulnerable to hash table collision attacks. This vulnerability could be used by an attacker to launch a denial-of-service attack against websites using affected products...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Windows Phone Denial of Service Attack Vulnerability

December 14, 2011 Added by:Dan Dieterle

"The attack is not device specific and appears to be an issue with the way the Windows Phone messaging hub handles messages. The bug is also triggered if a user sends a Facebook chat message or Windows Live Messenger message to a recipient..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Duqu Installer Contained Microsoft Word Zero-Day Exploit

November 03, 2011 Added by:Headlines

“The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution. We contacted Microsoft regarding the vulnerability and they’re working diligently towards issuing a patch and advisory..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Building a Backdoor

October 29, 2011 Added by:Joel Harding

A friend in another country wrote and asked me if the reason the United States suspected foreign equipment of containing a means of gaining surreptitious access to telecommunication, information or networked systems, commonly called a backdoor, was because the US routinely does it...

Comments  (0)

71d85bb5d111973cb65dfee3d2a7e6c9

Happy Birthday MS08-067

October 06, 2011 Added by:f8lerror

As a Penetration Tester, this vulnerability is sought out because it is highly reliable and very low risk. As an attacker, the simple fact is the attack still works. The vulnerability was widely used in conjunction with the conficker worm, which affected more than seven million systems...

Comments  (3)

94ae16c30d35ee7345f3235dfb11113c

Microsoft is Waging Cyberwar

September 30, 2011 Added by:Joel Harding

A federal court judge taps his gavel and the request for taking down a domain and all sub-domains is approved. This indicates to me that a corporation is taking care of me, a private citizen. It also indicates that the government cannot or will not protect me...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Hits Domain Provider in Kelihos Botnet Battle

September 28, 2011 Added by:Headlines

"We wanted to take it out early enough so that number one, it wouldn't grow and propagate... but also to make the point that when a threat is down, it's going to stay down. I think we made that point pretty effectively in this particular operation..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressmen Call for FTC Investigation on Supercookies

September 28, 2011 Added by:Headlines

“I am very disturbed by news that supercookies are being used to collect vast amounts of information about consumers’ online activities without their knowledge. Companies should not be behaving like supercookie monsters, gobbling up personal, sensitive information without users’ knowledge..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Microsoft Workaround for the SSL/TLS Vulnerability

September 28, 2011 Added by:Headlines

"If the user closes all existing HTTP tabs and untrusted HTTPS tabs, then browses to the trusted HTTPS site... and logs out of that HTTPS session before browsing any other HTTP sites or untrusted HTTPS sites, the user will NOT be at risk for this attack..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Companies in Collusion with Chinese Oppression

September 21, 2011 Added by:Headlines

"Entering into the Chinese market as a search engine or social media provider is an ethical mine field. In the hands of authorities determined to police their subjects, search engines and social media platforms such as Facebook can become a potent tool of online repression..."

Comments  (0)

0c9a263a54d950c6c0a7a0791e598a54

SharePoint DLP: Don't Bring a Gun to a Knife Fight

September 13, 2011 Added by:Thomas Logan

SharePoint's collaborative capabilities mean sensitive information can easily be put at risk. CIOs need to come up with a solution to this content security challenge, while still allowing the positive business benefits of SharePoint's collaboration capabilities in your organization...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »