Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [Rival] Microsoft Critically Flaws and Now Also Liable

  • Subject: [News] [Rival] Microsoft Critically Flaws and Now Also Liable
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Mon, 24 May 2010 07:20:56 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.4.2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Microsoft Fixes Critical Visual Basic and Outlook Express Flaws

,----[ Quote ]
| Microsoft, the software giant based in 
| Redmond (USA), released two critical 
| security updates on May 11, 2010, patching 
| vulnerabilities within its e-mail 
| applications as well as the Visual Basic 
| for Applications designed to implement 
| software programming language built into 
| Microsoft Office.
`----

http://www.spamfighter.com/News-14432-Microsoft-Fixes-Critical-Visual-Basic-and-Outlook-Express-Flaws.htm

Software Liabilities in the UK

,----[ Quote ]
| The British High Court ruled that a 
| software vendor's EULA -- which denied all 
| liability for poor software -- was not 
| reasonable.
`----

http://www.schneier.com/blog/archives/2010/05/software_liabil_1.html

New Exploit Resists Windows Security Software

,----[ Quote ]
| "This is definitely very serious," said 
| Alfred Huger, vice president of 
| engineering at Immunet, a Palo Alto, 
| Calif.-based antivirus company. "Probably 
| any security product running on Windows XP 
| can be exploited this way." Huger added 
| that Immunet's desktop client is not 
| vulnerable to the argument-switch attacks 
| because the company's software uses a 
| different method to hook into the Windows 
| kernel.
| 
| According to Matousec, nearly three-dozen 
| Windows desktop security titles, including 
| ones from Symantec, McAfee, Trend Micro, 
| BitDefender, Sophos and others, can be 
| exploited using the argument-switch 
| tactic. Matousec said it had tested the 
| technique on Windows XP SP3 and Vista SP1 
| on 32-bit machines.
`----

http://www.pcworld.com/article/196392/new_exploit_resists_windows_security_software.html?tk=rss_news
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkv6GsgACgkQU4xAY3RXLo740gCfeJPAnhbEunV5nnwREqcObC6p
QxEAni6dailjjQStQxio15zQ6DhPnWQo
=ilRz
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index