Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

MS patches block potential intrusion to heart of operating system.

Lumension Security : 13 February, 2008  (Technical Article)
The latest release of patches from Microsoft are critical in preventing a host of potential malicious software from gaining control of victim computers according to Lumension.
Microsoft has released six critical updates and five updates rated as important this February 2008 Patch Tuesday, one short of the Pre-Patch Tuesday announcement.

Alan Bentley, Regional VP of Lumension EMEA (formerly PatchLink) comments:

"Microsoft promised a busy Patch Tuesday this month and it has delivered one, making it essential for IT administrators to prioritise this flurry of patches. The Office and Internet Explorer vulnerabilities present the most worry and must be addressed first. The wide-spread use of these applications makes these vulnerabilities a prime target for hackers - IT administrators must pay close attention to bulletins MS08-010 addressing both Internet Explorer 6 and 7, and MS08-008, 009, 012 and 013 addressing Office.

"Attackers have shown in recent years that they'd rather target applications than go directly for the throat of the operating system, placing further pressure on businesses to address the Office and IE vulnerabilities.

"With all of the critical flaws allowing remote code execution and many not requiring end user consent, the potential for malware, botnets and Rootkits is rampant."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo