PDA

View Full Version : Attention all Windows users: patch your systems now


News
06-13-12, 07:20 PM
Online attackers are actively exploiting a vulnerability in Internet Explorer that allows them to execute malicious code on computers that visit booby-trapped websites, researchers said in an advisory that underscores the importance of installing a Microsoft patch as soon as possible.

The exploit of a critical IE bug, reported by researchers from antivirus provider McAfee (https://blogs.mcafee.com/mcafee-labs/active-zero-day-exploit-targets-internet-explorer-flaw), means there are two newly disclosed vulnerabilities in Microsoft products under attack. On Tuesday, Microsoft warned of a separate vulnerability (http://arstechnica.com/security/2012/06/attacks-actively-exploit-code-execution-bug-windows/) in all supported versions of Windows that was also actively being exploited.

The most immediate significance of the McAfee report is this: If you run Windows and haven't installed Tuesday's batch of security fixes, you should stop whatever else you're doing and run them now.

Read more (http://arstechnica.com/security/2012/06/windows-users-patch-now/) | Comments (http://arstechnica.com/security/2012/06/windows-users-patch-now/?comments=1#comments-bar)



http://feeds.feedburner.com/~ff/arstechnica/index?i=--5pQHHSYnU:wqmdk7ZjT90:V_sGLiPBpWU (http://feeds.arstechnica.com/~ff/arstechnica/index?a=--5pQHHSYnU:wqmdk7ZjT90:V_sGLiPBpWU) http://feeds.feedburner.com/~ff/arstechnica/index?i=--5pQHHSYnU:wqmdk7ZjT90:F7zBnMyn0Lo (http://feeds.arstechnica.com/~ff/arstechnica/index?a=--5pQHHSYnU:wqmdk7ZjT90:F7zBnMyn0Lo) http://feeds.feedburner.com/~ff/arstechnica/index?d=qj6IDK7rITs (http://feeds.arstechnica.com/~ff/arstechnica/index?a=--5pQHHSYnU:wqmdk7ZjT90:qj6IDK7rITs) http://feeds.feedburner.com/~ff/arstechnica/index?d=yIl2AUoC8zA (http://feeds.arstechnica.com/~ff/arstechnica/index?a=--5pQHHSYnU:wqmdk7ZjT90:yIl2AUoC8zA)
http://feeds.feedburner.com/~r/arstechnica/index/~4/--5pQHHSYnU

More... (http://feeds.arstechnica.com/~r/arstechnica/index/~3/--5pQHHSYnU/)