unauthorized access

  1. News

    TA12-346A: Microsoft Updates for Multiple Vulnerabilities

    Original release date: December 12, 2012 | Last revised: January 24, 2013 Systems Affected Microsoft Windows Microsoft Office Microsoft Server Software Internet Explorer Overview Select Microsoft software products contain multiple vulnerabilities. Microsoft has released...
  2. News

    TA13-015A: Microsoft Releases Update for Internet Explorer Vulnerability CVE-2012-4792

    Original release date: January 15, 2013 | Last revised: February 06, 2013 Systems Affected Microsoft Internet Explorer 6 Microsoft Internet Explorer 7 Microsoft Internet Explorer 8 Overview Microsoft has released Security Bulletin MS13-008 to address the CButton...
  3. News

    TA13-043B: Microsoft Updates for Multiple Vulnerabilities

    Original release date: February 12, 2013 Systems Affected Microsoft Windows Microsoft Internet Explorer Microsoft Office Microsoft Server Software Microsoft .NET Framework Overview Select Microsoft software products contain multiple vulnerabilities. Microsoft has...
  4. News

    TA13-043A: Adobe Updates for Multiple Vulnerabilities

    Original release date: February 12, 2013 Systems Affected Adobe Flash Player 11.5.502.149 and earlier versions for Windows and Macintosh Adobe Flash Player 11.2.202.262 and earlier versions for Linux Adobe Flash Player 11.1.115.37 and earlier versions for Android 4.x Adobe Flash...
  5. A

    Windows 7 Microsoft Kills Hotmail Hijack Threat

    It took Redmond 1 day to kill a threat that allowed users with a Firefox add-on (Tamper Data) to remotely reset the password of a Hotmail account and allowing them to access the outgoing HTTP request, then modify the data. Microsoft was notified April 20, 2012, applied the fix April 21...
  6. News

    MS11-100 - Critical : Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)

    Severity Rating: Critical Revision Note: V1.3 (February 1, 2012): Corrected registry keys and installation switches in the deployment tables for Windows Server 2003 and Windows Server 2008, and installation switches in the deployment table for Windows Vista. This is an informational...
  7. reghakr

    Session Hijacking

    In computer science, session hijacking is the exploitation of a valid computer session (commonly known as a "session key") used to gain unauthorized access to information or services in a computer system. For example, when a user logs in to a web site, the user's PC is tagged with a session...
  8. reghakr

    Bizarre pornography raid underscores Wi-Fi privacy risks

    BUFFALO, N.Y. — Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal...
  9. Captain Jack

    Windows 7 Hackers Access McDonald's Customer Data

    An unknown number of Link Removed after authorities discovered that hackers broke into one of the company's business partner's databases and stole information. Computerworld quotes a McDonald's spokeswoman as saying: We have been informed by one of our long-time business partners, Arc...
  10. D

    Windows 7 Windows Media Center crashes on startup

    I am running w7 home premium x86_64. I have all latest drivers. My problem is that when i start up windows media center, it crashes immediately. this is the error report it comes up with: Fault bucket , type 0 Event Name: CLR20r3 Response: Not available Cab Id: 0 Problem signature: P1...
  11. T

    Protection

    Sandbox There is an option in the True Image software called Try&Decide. This feature allows creating a secure, controlled temporary workspace on your computer without requiring you to install special virtualization software. You can perform various system operations without worrying that you...
  12. john3347

    Windows 7 Threat from co-workers???

    It would seem that this security hole would be an extremely serious flaw for people such as independent researchers who have co-workers who could have access to a computer during time periods that the rightful user was off duty. Bosses could easily "spy" on their employees, which would be a...
Back
Top