@vulnerability
Microsoft Warns IE Users of Security Threat
by CXOtoday Staff    Jul 07, 2009
Category : News & Analysis
Technology : Hardware & Software
Microsoft Corp. has warned about a serious computer security vulnerability that allows hackers to remotely take control of victims' machines. Microsoft is yet to fix the problem. The vulnerability, coined as "zero day"...
Microsoft Office Excel Has Critical Flaw
by Techtree News Staff    Feb 25, 2009
Category : News & Analysis
Technology : Hardware & Software
Security agencies found a critical vulnerability in Microsoft Office Excel. The flaw allows hackers to remotely execute a code through an infected Excel file. On opening an infected Excel file, users unknowingly execute a Trojan horse...
Microsoft Investigating Critical Flaw In DNS
by CXOtoday Staff    Apr 13, 2007
Category : News & Analysis
Technology : Hardware & Software
Microsoft has issued a security advisory (935964) stating that it is investigating new public reports of a limited attack exploiting vulnerability in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server Service Pack 4,...
CoreLabs Detects Flaw In GnuPG
by CXOtoday Staff    Mar 09, 2007
Category : News & Analysis
Core Security Technologies has issued an advisory disclosing a flaw in the GNU Privacy Guard (GnuPG or GPG). It is an OpenPGP- compliant cryptographic software system and is a part of the Free Software Foundation's (FSF) GNU software project,...
Tags: CoreLabs, GnuPG
Vulnerability In Microsoft Word
by Hanil Manghani    May 25, 2006
Category : News & Analysis
Security advisors like Symantec and F-Secure have detected and advised users about a zero-day vulnerability affecting Office 2002/2003/XP as well as Word 2002/ 2003 that could allow hackers to execute code on Windows PCs and even take control...
Panda Software Discovers WMFMaker Tool
by CXOtoday Staff    Jan 03, 2006
Category : News & Analysis
PandaLabs has reported a tool called WMFMaker, which allows generation of malicious Windows Meta File (WMFs) from any other code, which in turn allows malware to be dropped on user's systems. It then exploits the unresolved critical...
PAGE: 1