วันพุธที่ 13 พฤศจิกายน พ.ศ. 2556

IE used in Watering Hole Attack; Microsoft Fixes Internet Explorer; TIFF Bug Affects Older Software; And More

PC Magazine
  Security Watch November 13, 2013
 
View Online | Manage Subscription | Follow Us

TOP STORIES
New IE Zero-Day Used in Watering Hole Attack Targets Memory
Attackers are exploiting serious vulnerabilities in Internet Explorer in a watering hole attack, researchers from security firm FireEye warned. Users tricked into accessing the infected website are hit with malware that infects the computer's memory in a classic drive-by attack.

Share This:

Microsoft Fixes IE Zero-Day in November Patch Tuesday
Microsoft announced eight bulletins for November's Patch Tuesday release, addressing 19 unique vulnerabilities in Microsoft software, including Internet Explorer, Hyper-V, the Graphics Device Interface (GDI), Office, and others. The zero-day vulnerability in Internet Explorer disclosed by FireEye over the weekend has also been fixed.

Share This:

Microsoft Zero-Day TIFF Bug Affects Older Office Software
Microsoft disclosed a critical zero-day vulnerability in how older versions of Microsoft Windows and Office handle the TIFF image format this week. Even though the flaw is actively being exploited in the wild, the company said a patch will not be ready for next week's Patch Tuesday release.

Share This:

The Best Antivirus for 2013
Most antivirus vendors that run on a yearly update schedule wait until the fall to release the next year's version, just like car manufacturers. So, the "2014 models" appear in the fall of 2013. As new versions arrive, most of the same products retain their positions at the top of the heap. Here are the best from the current crop of antivirus products.

Share This:

The Best Security Suites for 2013
A lot of different components must thoroughly mesh and work together well to make a security suite. Some suites are barely more than an antivirus plus firewall, while others include every feature imaginable. In the very best suites, all components are equally effective, but a suite that's only good at a few security tasks can still be useful if its strong points match your needs. These are the best of the best.

Share This:

Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here:

Featured Research
Expense Management
Top 6 Considerations for Online Expense Management
On-Demand CRM
SMB On-Demand CRM Comparison Guide
CRM Through the Ages
CRM Through the Ages: An Infographic

FEATURED OFFERS



PCMag Editor's Choice AWARD-WINNING TECH
now on sale!

CyberLink PowerDirector 12  |  Video Editing
MSRP: $99.99 |  $89.99

SOS Online Backup - $9.99/mo  |  Online Backup
MSRP: $9.99 |  $9.99

Roku 2  |  Media Hubs
MSRP: $79.99 |  $79.99 + Free Shipping 

Parrot AR.Drone 2.0  |  Toys
MSRP: $299.99 |  $299.99 + Free Shipping 

Google Nexus 7 (2013)  |  Tablets
MSRP: $269.99 |  $229.99 + Free Shipping 


eNewsletter Information
You are subscribed to PCMag.com's Security Watch with the email address pctipworld@gmail.com. Click here to unsubscribe from this newsletter.

To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here.



Copyright ©2013 Ziff Davis, Inc.  All Rights Reserved.
Ziff Davis, Inc., 28 East 28th Street, 11th Floor, New York, NY 10016

ไม่มีความคิดเห็น:

แสดงความคิดเห็น

 

Blogger news

Blogroll

NosLia Blog - Computer IT

About