Vulnerability in Internet Explorer Could Allow Remote Code Execution

Sunday, April 27th, 2014

Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses ...

Cyber threats to Windows XP and guidance for Small Businesses and Individual Consumers

Tuesday, March 25th, 2014

It’s been well publicized that on April 8th, 2014 Microsoft discontinues product support for Windows XP.  Released in 2001, the support policy for the life of Windows XP soon followed in October 2002.  In September 2007, we announced that support for Windows XP would be extended an additional two years ...

All major browsers fall during second day at Pwn2Own hacking contest

Friday, March 14th, 2014

Security researchers demonstrated zero-day exploits against Google Chrome, Microsoft Internet Explorer, Apple Safari, Mozilla Firefox and Adobe Flash Player during the second day of the Pwn2Own hacking competition Thursday, racking up total prizes of US$450,000. A team from French vulnerability research firm Vupen hacked Google Chrome by exploiting a use-after-free vulnerability ...

One tweak can make your Windows PC virtually invulnerable

Thursday, February 20th, 2014

Microsoft published 147 vulnerabilities in 2013 that were rated as Critical. Critical, however, is a relative term, and there is one simple thing anyone can do that would guard against almost every single Critical vulnerability according to a new report from Avecto. In its 2013 Microsoft Vulnerabilities Study, Avecto found that you could ...

New IE Zero-Day Found in Watering Hole Attack

Thursday, February 13th, 2014

FireEye Labs has identified a new Internet Explorer (IE) zero-day exploit hosted on a breached website based in the U.S. It’s a brand new zero-day that targets IE 10 users visiting the compromised website–a classic drive-by download attack. Upon successful exploitation, this zero-day attack will download a XOR encoded payload ...