Microsoft shared details of workarounds that Windows users can implement to protect themselves against exploits targeting a new zero-day vulnerability which allows attackers to steal information from users.

The company confirmed reports of the newly discovered Windows security hole, as well as the fact that both published information and proof-of-concept code made their way into the wild.

According to the software giant, the flaw resides in the MHTML (MIME Encapsulation of Aggregate HTML). Applications such as Internet Explorer leverage MHTML to interpret MIME-formatted requests for content blocks within certain documents that need to be rendered. More »

Microsoft has made available for download a new security tool designed to assess the attack surface of Windows operating systems.

As Windows platforms are being used, a variety of changes are introduced, more often than not, increasing the risk of attacks.

One scenario illustrative of this involves the installation of new software. Applications deployed on top of Windows manage not only to add extra functionality and capabilities that customers need, but also to introduce changes, some of which could represent security liabilities, or even be exploitable vulnerabilities.

This is why the Redmond company decided to share with the world an internal tool designed to catalog changes introduced to the Windows platform by new software being installed. More »

Microsoft has confirmed a zero-day vulnerability affecting all supported versions of Internet Explorer, including IE8, IE7 and IE6.

The Redmond company explains that the security flaw involves the creation of uninitialized memory during a CSS function within the browser.

“It is possible under certain conditions for the memory to be leveraged by an attacker using a specially crafted Web page to gain remote code execution,” the software giant informed.

Given the fact that successful exploits against this vulnerability can allow for remote code execution, and attacker could potentially take over a victim’s computer.

However, Dave Forstrom, Director, Trustworthy Computing, Microsoft denied that this has happened yet. More »

Microsoft has wrapped up 2010 with a real bang as far as the volume of security vulnerabilities goes.

The company released no less than 17 security bulletins in December 2010, patching no less than 40 vulnerabilities.

However, just a couple of the patch packages are rated Critical, which means that the security holes they’re designed to plug can allow attackers to execute code remotely on a vulnerable computer and gain control over the machine.

The updates resolve security flaws in a range of products, including Office, Windows, Internet Explorer, SharePoint Server and Exchange.

Jerry Bryant, group manager, response communications, Microsoft was kind enough to provide a complete list with all the security bulletins issued by the software giant this month, which customers will be able to find below. More »