Microsoft Malware Protection Engine に関する新規アドバイザリ 2491888 を公開
Wednesday, February 23, 2011
本日、セキュリティ アドバイザリ 2491888 を公開し、Microsoft Malware Protection Engine の更新プログラム (バージョン 1.1.6603.0 以上
Wednesday, February 23, 2011
本日、セキュリティ アドバイザリ 2491888 を公開し、Microsoft Malware Protection Engine の更新プログラム (バージョン 1.1.6603.0 以上
Thursday, February 17, 2011
皆さん、今月のセキュリティ更新プログラムはもうインストールしていただけましたでしょうか?お気づきの方
Wednesday, February 16, 2011
Earlier this week a PoC exploit for a vulnerability in the BROWSER protocol was released on Full Disclosure. There has been some discussion regarding whether this issue can result in Remote Code Execution (RCE) or is only a Denial of Service (DoS). This blog post provides details on the exploitability based on our internal analysis.
Monday, February 14, 2011
From time to time we receive questions regarding fixes not documented in security bulletins. Some call these “silent fixes.” We hope this blog post answers those questions and helps clarify Microsoft’s process in fixing and documenting all vulnerabilities and addressing internally discovered variants. It’s important to remember the following: As part of Microsoft’s comprehensive security update process, Microsoft will address variants of reported issues.
Monday, February 14, 2011
The Official Microsoft Japan Blog に、日本マイクロソフトで技術を統括している CTO(最高技術責任者)加治佐の記事「果てしなく
Thursday, February 10, 2011
Hello, Today we published the February Security Bulletin Webcast Questions & Answers page. We fielded 12 questions on various topics during the webcast, including bulletins released, deployment tools, and update detection tools. We invite our customers to join us for the next public webcast on Wednesday, March 9th at 11am PST (-8 UTC), when we will go into detail about the March bulletin release and answer questions live on the air.
Tuesday, February 08, 2011
先週の事前通知でお伝えした通り、セキュリティ情報計 12 件 (緊急 3 件、重要 9 件) を公開しました。今月公開
Tuesday, February 08, 2011
皆さん、こんにちは!ワンポイントセキュリティ担当者です。 先ほど 2 月のワンポイント セキュリティ情報を公
Tuesday, February 08, 2011
Today we released twelve security bulletins. Three have a maximum severity rating of Critical and nine have a maximum severity rating of Important. This release addresses three publicly disclosed vulnerabilities. We hope that the table below helps you prioritize the deployment of the updates appropriately for your environment. Bulletin Most likely attack vector Max Bulletin Severity Max Exploit-ability Likely first 30 days impact Platform mitigations and key notes MS11-003(IE) Victim browses to a malicious webpage.
Tuesday, February 08, 2011
Hi! I’m Adam Shostack, a program manager working in TWC Security, and I’d like to talk a bit about today’s AutoRun update. Normally, I post over on the SDL blog, but of late I’ve been doing a lot of work in classifying and quantifying how Windows computers get compromised. One thing that popped from that analysis was the proportion of infected machines with malware that uses Autorun to propagate.