Microsoft Security Advisory (2887505) On September 17th, 2013, Microsoft published Security Advisory 2887505, which coverers a remote code execution vulnerability in all supported versions of Microsoft Internet Explorer. The flaw resides in the handling of objects in memory which have been deleted or improperly allocated. Specifically, a use-after-free flaw in the HTML rendering engine (aka Read more…
日本政府は、職員が誤って内部メモを一般に公開したことを認めており、これは Google グループのオンラインディスカッションでプライバシー設定を誤ったことが原因だとしています。公開された内容には、水銀の輸出入に関する国際条約についての協議予定や、その問題をめぐってスイスとノルウェーの環境相間で交わされた議論なども含まれていました。環境省の担当者は、この内部メモは極秘のものではなかったが、同様の漏えいを防ぐ対策をすでに講じたと述べています。
In conjunction with our investigation into Operation Troy, we will be releasing IOC data in the open and highly flexible OpenIOC Framework format. The McAfee Operation Troy IOC can be downloaded here. In addition to various open/free tools, OpenIOC data can be consumed by: McAfee Read more…
Cloud-based online services are useful tools for many enterprises, allowing them to coordinate their teams, share information and enable discussions within groups. However, companies should be sharply aware of how they manage their privacy settings for…
The Problem Cybercriminals are targeting organizations successfully in spite of traditional security measures as noted recently by the NY Times and a front page article in the Wall Street Journal on cyber espionage. This issue is driven by the cybercriminal gangs’ ability to compromise vulnerable systems using sophisticated reconnaissance and penetration tactics. So, how do Read more…