Announcements

Cumulative Security Update for Internet Explorer

  • 10th March 2015
The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less ...
Continue reading

Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution

  • 10th March 2015
The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted file or website. An attacker who successfully exploited the vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user ...
Continue reading

Vulnerabilities in Microsoft Office Could Allow Remote Code Execution

  • 10th March 2015
The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less ...
Continue reading

Cybercriminals Encrypt Website Databases in RansomWeb Attacks

  • 18th February 2015
Malicious actors are encrypting website databases and holding them for ransom, Switzerland-based security firm High-Tech Bridge revealed on Wednesday. File encrypting ransomware has become highly problematic for both regular Internet users and organizations. However, researchers at High-Tech Bridge have spotted a new type of attack that threatens ...
Continue reading