Vulnerability in VBScript Could Allow Remote Code Execution

Tuesday, March 2nd, 2010

Microsoft is investigating new public reports of a vulnerability in VBScript that is exposed on supported versions of Microsoft Windows 2000, Windows XP, and Windows Server 2003 through the use of Internet Explorer. Our investigation has shown that the vulnerability cannot be exploited on Windows 7, Windows Server 2008 R2, ...

Microsoft To Release Five Critical Patches Tuesday

Saturday, September 5th, 2009

Microsoft will roll out a total of five critical patches for numerous versions of Windows operating systems in its upcoming September "Patch Tuesday" security update release, according to a Microsoft Advanced Notification bulletin posted Thursday.All five patches plug holes that allow remote code execution, indicating that hackers could remotely exploit ...

All Internet Explorer Versions Have Hole

Saturday, December 13th, 2008

The unpatched bug in Internet Explorer 7 (IE7) that hackers are now exploiting also exists in older versions of the browser, including the still-widely-used IE6, Microsoft Corp. said. Friday, a Danish security researcher added that Microsoft's original countermeasure advice was insufficient, and recommended users take one of the new steps the ...

AVG Virus Scanner Accidentally Removes Critical Windows Component

Tuesday, November 11th, 2008

The world of computer security can be a scary place for friends and foes alike. This weekend users' found their AVG software updated with a new virus definition file. Then they quickly found their computers crashing. What was discovered was that the new virus definition file mistook user32.dll, a ...

Researcher to Demonstrate Attack Code for Intel Chips

Monday, July 14th, 2008

Security researcher and author Kris Kaspersky plans to demonstrate how an attacker can target flaws in Intel's microprocessors to remotely attack a computer using JavaScript or TCP/IP packets, regardless of what operating system the computer is running. Kaspersky will demonstrate how such an attack can be made in a presentation at ...