Join thousands of people who receive the latest breaking cybersecurity news every day.
Microsoft took steps Tuesday to avoid repeating the debacle two months
ago that left Windows XP users staring at the notorious “Blue Screen of
Death” error message after they applied a patch. Read the full article. [Computerworld]
CanSecWest: Two security researchers at search engine giant Google have discovered
20 kernel bugs, about half remaining unpatched, affecting Windows,
Linux and the popular VMware virtualization software over the last
several years. Read the full article. [TechTarget]
One day after a Google security researcher releases code to expose a flaw that affects every release of the Windows NT kernel — from Windows NT 3.1 (1993) up to and including Windows 7 (2009) — Microsoft has released a security advisory to acknowledge the issue and warn of the risk of privilege escalation attacks.
part of its scheduled batch of patches for November, Microsoft today
issued six security bulletins with fixes for a total of 15
vulnerabilities affecting its Windows and Office product lines.
Three of the six bulletins are rated “critical,” meaning they can be
used to launch remote code execution or worm attacks without any user
action. One of the Windows vulnerabilities could expose users to
drive-by malware attacks via the browser, Microsoft warned.
InfoSec Insider content is written by a trusted community of Threatpost cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
Sponsored Content is paid for by an advertiser. Sponsored content is written and edited by members of our sponsor community. This content creates an opportunity for a sponsor to provide insight and commentary from their point-of-view directly to the Threatpost audience. The Threatpost editorial team does not participate in the writing or editing of Sponsored Content.