![]() |
Don't know if it's been posted before, but it might be worth patching...
------------- Washington: Microsoft warned today about a serious flaw in almost every version of its popular Windows software that could allow hackers to seize control of a person's computer when victims read e-mails or visit websites. Microsoft assessed the problem's urgency as critical, its highest level, and urged customers to download a free repairing patch immediately from its website, www.microsoft.com/security. The company said it was unaware of any reports that hackers already had used the technique to break into computers, but the time between disclosure of a new flaw and such break-ins has become increasingly short. Russ Cooper, a security expert for TruSecure Corp, based in Herndon, Virginia, predicted that antivirus software will be updated to protect users who might receive infected emails and that websites with infected pages would be shut down quickly once they are detected. "I doubt we will see an attack based on this," Cooper said. "It's pretty unlikely any such exploit attempt will get legs." The problem involves tricking Windows into processing unsafe code built into a webpage or email message. It was particularly unusual because it affected so many different versions of Windows, from Windows 98 to its latest Windows XP editions. There was some good news. Microsoft said customers using the newest versions of its email software, Outlook Express 6 and Outlook 2002, were protected from hackers trying to exploit the problem using emails. Older versions of Outlook would also be safe if customers had manually applied another security patch, which Microsoft released in 2000 after the spread of the damaging "ILOVEYOU" virus. Microsoft said customers could manually adjust settings hidden deep within its Internet Explorer browsing software to prevent Windows from processing the dangerous code. Experts, however, said that was not easy to do for many users and that it would cripple convenient functions for many popular websites. |
Thanks Memnoch... BUT... when you typed the link... you added a fullstop on the end... AND where on the actual page www.microsoft.com/security (instead of www.microsoft.com/security. ) can you find the patch?
|
Quote:
Thanks for the heads up Timberflake! [img]tongue.gif[/img] [img]graemlins/biglaugh.gif[/img] </font> |
Will it ever end? :(
|
MS isn't the only one....
http://msn.com.com/2100-1105-993278.html?type=pt I think this link will work. http://smilies.sofrayt.com/%5E/a0/tease.gif |
It's really hard to envision all possible scenarios when building an OS. It may not be an issue now, but it could be in a few months when technology advances once again.
|
GRRR more patches to have to get... *gets* thanks for the link though
|
All times are GMT -4. The time now is 01:48 AM. |
Powered by vBulletin® Version 3.8.3
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
©2024 Ironworks Gaming & ©2024 The Great Escape Studios TM - All Rights Reserved