ICT Security-Sécurité PC et Internet
87.1K views | +0 today
ICT Security-Sécurité PC et Internet
ICT Security + Privacy + Piracy + Data Protection - Censorship - Des cours et infos gratuites sur la"Sécurité PC et Internet" pour usage non-commercial... (FR, EN+DE)...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Microsoft warns users about 0-day behind PowerPoint attacks

Microsoft warns users about 0-day behind PowerPoint attacks | ICT Security-Sécurité PC et Internet | Scoop.it

Might put out patch in update, might chuck it out sooner.

The bug (CVE-2014-6352) can be triggered by sending a specially crafted Microsoft Office files to intended targets before tricking them into opening the booby-trapped files. "Currently, attacks using PowerPoint files are known to exist, but all Office file types can be used to carry out this attack," Jonathan Leopando, a technical communications staffer at Trend Micro, warns in a blog post.


Gust MEES's insight:

The bug (CVE-2014-6352) can be triggered by sending a specially crafted Microsoft Office files to intended targets before tricking them into opening the booby-trapped files. "Currently, attacks using PowerPoint files are known to exist, but all Office file types can be used to carry out this attack," Jonathan Leopando, a technical communications staffer at Trend Micro, warns in a blog post.

No comment yet.
Scooped by Gust MEES
Scoop.it!

Drive-by Download Attacks: Examining the Web Server Platforms Attackers Use Most Often

Drive-by Download Attacks: Examining the Web Server Platforms Attackers Use Most Often | ICT Security-Sécurité PC et Internet | Scoop.it

The official Microsoft Security Blog provides in-depth discussion of security, cybersecurity and technology trends affecting trust in computing, as well as timely security news, trends, and practical security guidance. 


We have included data on drive-by download attacks in numerous past volumes of the Microsoft Security Intelligence Report. But in the latest volume of the report, volume 15, we published some new data that we haven’t included in the report before - the relative prevalence of drive-by download sites hosted on different web server platforms.


Drive-by download attacks continue to be many attacker’s favorite type of attack. This is something I have written about several times in the past:

.





Gust MEES's insight:
.



No comment yet.
Scooped by Gust MEES
Scoop.it!

Microsoft welcomes Secunia to vulnerability security alliance

Microsoft welcomes Secunia to vulnerability security alliance | ICT Security-Sécurité PC et Internet | Scoop.it
Secunia and Microsoft have partnered to offer a consolidated approach to patch management.

 

The partnership sees Secunia selected as Microsoft's first vulnerability security alliance partner, which will also enable the technology giant to introduce Secunia's products to its global technology centres that will allow users to deploy third-party patches.


Gust MEES's insight:

 

The partnership sees Secunia selected as Microsoft's first vulnerability security alliance partner, which will also enable the technology giant to introduce Secunia's products to its global technology centres that will allow users to deploy third-party patches.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Office - Vulnérabilité dans le traitement des fichiers RTF

Office - Vulnérabilité dans le traitement des fichiers RTF | ICT Security-Sécurité PC et Internet | Scoop.it

Une vulnérabilité, permettant l'exécution de code malicieux, a été découverte dans Microsoft Word. Cette vulnérabilité est déjà exploitée activement dans des pièces jointes au format RTF (Rich text files) de courriers électroniques indésirables.

RéférencesClassification

Orange (niveau 4/5)

Systèmes vulnérables

Toutes les versions de Microsoft Office Word sont vulnérables (même sur Mac).

Mesures à prendre :
  • n'ouvrez pas les fichiers au format RTF avec Word ;
  • appliquez la solution de contournement de Microsoft en attendant une mise à jour ;
  • réglez word pour que les fichiers RTF soient bloqués ;
  • installez l'outil de protection contre l'exploitation de vos logiciels, EMET ;
  • observez les réflexes BEE SECURE/CASES de sécurité.


Gust MEES's insight:


Mesures à prendre :
  • n'ouvrez pas les fichiers au format RTF avec Word ;
  • appliquez la solution de contournement de Microsoft en attendant une mise à jour ;
  • réglez word pour que les fichiers RTF soient bloqués ;
  • installez l'outil de protection contre l'exploitation de vos logiciels, EMET ;
  • observez les réflexes BEE SECURE/CASES de sécurité.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Critical security updates for users of Microsoft and Adobe software

Critical security updates for users of Microsoft and Adobe software | ICT Security-Sécurité PC et Internet | Scoop.it
Patch Tuesday has been and gone, which means that if you're responsible for the security of the computers in your office - or the ones you use at home - it's time to update your systems once again.
Gust MEES's insight:

 

Learn more:

 

http://gustmees.wordpress.com/2012/05/03/update-your-third-party-applications/

 

Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

Microsoft fixes 9 flaws, Adobe 3 in April's Tuesday update

Microsoft fixes 9 flaws, Adobe 3 in April's Tuesday update | ICT Security-Sécurité PC et Internet | Scoop.it
As expected Microsoft released seven important and two critical fixes for Windows, Internet Explorer and other Microsoft products. Adobe followed suite releasing fixes for ColdFusion, Flash and Sho...
Gust MEES's insight:

 

                              ===> Update asap!!! <===

Gust MEES's curator insight, April 9, 2013 5:54 PM

 

                                 ===> Update asap!!! <===