Severity: High 14 June, 2011 Summary: These vulnerabilities affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: Typically, by enticing one of your users to visit a malicious web page Impact: In the worst case an attacker can execute code on your user's computer, gaining complete control of it What to … [Read more...]
Nasty WINS Messages Hijack Windows Servers
Severity: High 10 May, 2011 Summary: These vulnerabilities affect: Windows Server 2003 and 2008 How an attacker exploits them: By sending specially crafted WINS packets Impact: An attacker can gain complete control of your Windows computer What to do: Install the appropriate Microsoft patches as soon as possible, or let Windows Automatic Update do it for you. Exposure: As … [Read more...]
Office Updates: Beware Evil PowerPoint Documents
Severity: High 10 May, 2011 Summary: These vulnerabilities affect: Most current versions of Microsoft PowerPoint for Windows and Mac (ships with Office), except for 2010. How an attacker exploits it: By tricking one of your users into opening a malicious PowerPoint document Impact: In the worst case, an attacker executes code on your user's computer, gaining complete … [Read more...]
IE Update Corrects Code Execution and Information Disclosure Flaws
Severity: High 12 April, 2011 Summary: This vulnerability affects: All current versions of Internet Explorer, running on all current versions of Windows How an attacker exploits it: Typically, by enticing one of your users to visit a malicious web page Impact: In the worst case an attacker can execute code on your user's computer, gaining complete control of it What to do: … [Read more...]
2011's First OS X Update Patches 57 Vulnerabilities
Summary: These vulnerabilities affect: All current versions of OS X 10.5.x (Leopard) and OS X 10.6.x (Snow Leopard) How an attacker exploits them: Multiple vectors of attack, including enticing your users to visit a malicious web site, or into downloading and viewing various documents or images Impact: Various results; in the worst case, an attacker executes code on your … [Read more...]