Severity: High Summary: These vulnerabilities affect: Most current versions of Internet Explorer (IE) How an attacker exploits them: By enticing one of your users to visit a malicious web page Impact: An attacker can execute code on your user's computer, often gaining complete control of it What to do: Install Microsoft's IE updates immediately, or let Windows Automatic … [Read more...]
IE Update Fixes Multiple "Use After Free" Vulnerabilities
Severity: High Summary: These vulnerabilities affect: Most current versions of Internet Explorer (IE) How an attacker exploits them: By enticing one of your users to visit a malicious web page Impact: An attacker can execute code on your user's computer, often gaining complete control of it What to do: Install Microsoft's IE updates immediately, or let Windows Automatic … [Read more...]
Two IE Bulletins Double the Browser Updates
Severity: High Summary: These vulnerabilities affect: Internet Explorer (IE) 10 and earlier How an attacker exploits them: Typically, by enticing one of your users to visit a web page with malicious content Impact: Various; In the worst case, an attacker can execute code on your user's computer, often gaining complete control of it What to do: Install Microsoft's Internet … [Read more...]
Emergency Flash Update Fixes "In the Wild" Vulnerabilities
Summary: These vulnerabilities affect: Adobe Flash Player running on all platforms How an attacker exploits it: By opening any malicious Flash (SWF) content; whether from a web site, within a Word document, and so on Impact: In the worst case, an attacker can execute code on the user's computer, potentially gaining control of it What to do: Download and install the latest … [Read more...]
Emergency Flash Update Fixes "In the Wild" Vulnerabilities
Summary: These vulnerabilities affect: Adobe Flash Player running on all platforms How an attacker exploits it: By opening any malicious Flash (SWF) content; whether from a web site, within a Word document, and so on Impact: In the worst case, an attacker can execute code on the user's computer, potentially gaining control of it What to do: Download and install the latest … [Read more...]