HomeBlogsSecurity Watch

Security Watch

IE7 Coming Through on WSUS, Blocker Toolkit or Not

Larry Seltzer here, pointing you to this recent Knowledge Base article with Microsoft's announcement that Internet Explorer 7 will be distributed through WSUS (Windows...

Linux Security Specialist Joins Microsoft

Linux security guru Crispin Cowan is leaving the open-source world to join (gasp!) Microsoft's Windows security team.Cowan (left), co-founder of the Immunix Linux distro...

Researchers Find Code Execution Bug in Skype

Security researchers have found a serious security vulnerability that could result in PC hijack attacks against users of the wildly popular Skype voice chat...

Movable Type Ships ‘Mandatory’ Security Update

Blogging software provider Six Apart has released a mandatory security update for its flagship Movable Type product, warning that unpatched installations are vulnerable to...

MS08-001: Open Door for the Next Big Windows Worm?

If you haven't applied Microsoft's MS08-001 patch yet, now might be a good time to hit that 'Download and Apply' button.According to computer security...

Cisco Swats Critical CallManager Bug

Switching and routing giant Cisco has shipped a high-priority update to fix a critical flaw affecting its CallManager software product.The bug, discovered and reported...

How to Minimize Risk from Zero-Day Attacks

As I wrote in this piece over at eWEEK.com, rigged Microsoft Excel files are being used to exploit a zero-day (previously unknown/unpatched) vulnerability and...

Apple Plugs QuickTime, iPhone Security Holes

Here's something that may be buried in the crazy Macworld news cycle: Apple has shipped two high-priority (critical) security patches for the QuickTime, iPhone...

$20,000 Bounty Placed on Windows Flaws, Exploits

A private company has placed a $20,000 bounty on exploitable vulnerabilities in Microsoft's Windows operating system, a move that significantly raises the value of...

Mac Malware Arrives with Market Share Gains

We've seen these kinds of fake security applications floating around Windows-land, using clever social engineering lures to trick computer users into buying malware to...