Security Advisor

RCE Fixes Win the Attention of June's Microsoft Patch

Microsoft's June security present arrived yesterday, and, as is now the norm, remote code execution fixes make up four of the seven bulletin items. That's because hackers prefer exploiting your system from a distance over having you look over their shoulders when they invade your home.

The consensus among security experts is that bulletin MS12-037, a "cumulative" security update for Internet Explorer should be taken care of immediately. That's because it takes care of a batch of 12 holes -- some that have already been seen being exploited in the wild. And a Web browser seems like an easier window into your system than, say, waiting for you to fall for an elaborate attack in Photoshop.

Along with this batch of fixes, Microsoft is also changing its policy on how your system identifies bogus Microsoft certificates. And if you guessed this is in response to the Flame malware hiding under fake certificates, you would be 100 percent correct.

The major change is that instead of asking for your permission before updating its certificate black list, it will automatically send the information to your system.

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • Microsoft Adding Google G Suite Migration in Exchange Admin Center

    Microsoft's Exchange Admin Center will be getting the ability to move Google G Suite calendar, contacts and e-mail data over to the Office 365 service "in the coming weeks."

  • Qualcomm Back in Datacenter Fray with AI Chip

    The chip maker joins a crowded field of vendors that are designing silicon for processing AI inference workloads in the datacenter.

  • Microsoft To Ship Surface Hub 2S Conference Device in June

    Microsoft on Wednesday announced a June U.S. ship date for one of its Surface Hub 2S conferencing room products, plus a couple of other product milestones.

  • Kaspersky Lab Nabs Another Windows Zero-Day

    Kaspersky Lab this week described more about a zero-day Windows vulnerability (CVE-2019-0859) that its researchers recently discovered, and how PowerShell was used by the exploit.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.