Microsoft has released security update for Internet Explorer. This update addresses vulnerabilities exist when Internet Explorer improperly accesses objects in memory. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system if a user views a specially crafted webpage using Internet Explorer. Affected Software:- …
Read More »Current Activities
Microsoft Security Update – Vulnerability in Group Policy could allow remote code execution
Microsoft has released security update for Windows. This update addresses vulnerability by improving how domain-configured systems connect to domain controllers prior to Group Policy accepting configuration data. Exploitation of this vulnerability could allow an attacker to take complete control of an affected system if convinces a user with a domain-configured …
Read More »Microsoft Security Bulletin for February 2015
Microsoft has released security bulletin for the month of February 2015 to address vulnerabilities in Windows. Exploitation of these vulnerabilities could allow elevation of privilege, disclosure of information, remote code execution or security feature bypass. Users and administrators are encouraged to review Microsoft Security Bulletins MS15-Feb and apply the necessary …
Read More »Security Updates for Adobe Flash Player
Adobe has released security updates for Flash Player. These updates address critical vulnerability that could potentially allow an attacker to take control of the affected system. Affected software versions are:- .Adobe Flash Player 16.0.0.296 and earlier versions .Adobe Flash Player 13.0.0.264 and earlier 13.x versions .Adobe Flash Player 11.2.202.440 and …
Read More »Security Update for Google Chrome
Google has released Chrome 40.0.2214.111 for Windows, Mac and Linux. This update addresses multiple vulnerabilities (e.g. Use-after-free in DOM [CVE-2015-1209], Cross-origin-bypass in V8 bindings [CVE-2015-1210], Privilege escalation using service workers [CVE-2015-1211]) that could allow an attacker to cause a denial of service condition or obtain personal information. Users and administrators …
Read More »