Vulnerability in MHTML Could Allow Information Disclosure

Saturday, January 29th, 2011

Microsoft is investigating new public reports of a vulnerability in all supported editions of Microsoft Windows. The vulnerability could allow an attacker to cause a victim to run malicious scripts when visiting various Web sites, resulting in information disclosure. This impact is similar to server-side cross-site scripting (XSS) vulnerabilities. Microsoft ...

Security tool uncovers multiple bugs in every browser

Tuesday, January 4th, 2011

Browser security specialist Michal Zalewski believes that Chinese hackers have long been aware of a security vulnerability in Internet Explorer which has only recently come to public attention. It is believed that this vulnerability could be exploited to infect computers, though current efforts have succeeded only in provoking crashes. The ...

Block the Windows Shortcut Exploit

Monday, July 26th, 2010

The Windows Shortcut Exploit is a zero-day vulnerability in all versions of Windows that allows a Windows shortcut link to run a malicious DLL file. Sophos now has a free, easy-to-use tool blocks this exploit from running on your computer.Please note: Existing Sophos Endpoint customers are already protected from the ...

Update Adobe Flash Now!

Sunday, June 6th, 2010

A critical vulnerability exists in Adobe Flash Player 10.0.45.2 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems, and the authplay.dll component that ships with Adobe Reader and Acrobat 9.x for Windows, Macintosh and UNIX operating systems. This vulnerability (CVE-2010-1297) could cause a crash and potentially allow an ...

Adobe issues official workaround for PDF vulnerability

Wednesday, April 7th, 2010

For consumers, open up the Preferences panel and click on "Trust Manager" in the left pane. Clear the check box "Allow opening of non-PDF file attachments with external applications". For administrators who wish to accomplish this with a registry setting on Windows, add the following DWORD value to: HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\\Originals Name: bAllowOpenFile Type: REG_DWORD Data: ...