TITLE

The reaction to WMF

PUB. DATE
February 2006
SOURCE
SC Magazine: For IT Security Professionals (UK Edition);Feb2006, p18
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on a security flaw announced by Microsoft Corp. in February 2006. The security flaw seems to affect virtually every single version of Windows right back to version 3.0. The threat is one of the most pervasive threats to hit the Internet since 2004, according to the findings of a study conducted by ScanSafe. Mikko Hypponen, chief research officer of F-Secure, estimated that ninety-nine percent of computers across the world are vulnerable to attack because of the flaw. Tom Newton, product development manager of Smooth Wall, commented that one of the risks facing Microsoft is that it may have encouraged computer hackers to join in the bug hunt after the firm's admission to search through all of its legacy code.
ACCESSION #
20056923

 

Related Articles

  • Microsoft to rush WMF patch.  // eWeek;1/9/2006, Vol. 23 Issue 2, p29 

    This article focuses on the announcement made by Microsoft Corp., that it is releasing a fix for a critical and previously unknown security vulnerability in a Windows component used to render Windows Metafile (WMF) graphics files. The company wants to test a patch as early as possible for a...

  • Today's Attackers Can Find the Needle. Mimoso, Michael S.; Savage, Marcia // Information Security;Jun2006, Vol. 9 Issue 6, p24 

    This article discusses the type of for-profit crime plaguing the Internet. Today's hackers want customer data and intellectual property and they also want to infiltrate government agencies. Stealth technology that are being used by attackers include rootkits which are bundled in spyware. Ways to...

  • An Usage-Centric Botnet Taxonomy. Czosseck, Christian; Podins, Karlis // Proceedings of the European Conference on Information Warfare & ;2011, p65 

    Botnets have been a recognized threat to computer security for several years. On the timeline of malware development, they can be seen as the latest evolutionary step. Criminals have taken advantage of this new technol-ogy and cyber crime has grown to become a serious and sophisticated problem...

  • Hey, You've Got Worms. Levy, Steven // Newsweek;2/9/2004, Vol. 143 Issue 6, p9 

    Focuses on the fast-growing computer worm Mydoom. Intent of the rogue software to use computer browsers to attack Web site of the company SCO; Estimated number of computers that were infected; How Mydoom runs on Microsoft Windows; Security measures that have been taken by Microsoft; Criticism...

  • Don't trust trusted computing. Rapoza, Jim // eWeek;11/21/2005, Vol. 22 Issue 46, p45 

    The article focuses on computer security and trusted computing. The core Trusted Platform Modules, if used properly, can be of help in many situations, offering greater hardware-based security for keys and tokens. But the operative words here are if used properly. At any rate, Microsoft Corp....

  • Razor wire for Windows. Dudley, Gavin // Finance Week;8/2/2004, p47 

    Reports on the public relations crisis experience of Microsoft Corp. in 2004 due to weekly reports of weaknesses and security flaws in its product that expose ordinary consumers as well as corporate users to virus and hacker attacks. Marketing strategy to dispel customer concerns; Improvements...

  • Safe as e-houses.  // Management Services;Apr2003, Vol. 47 Issue 4, p22 

    The paper assesses the move that was taken by Microsoft Corp. in making personal computers a lot more secure. Although passwords are a cheap and convenient way to authenticate computer users, there are some fundamental problems with the concept as a whole. Passwords must be changed regularly and...

  • Safe as e-houses.  // Management Services;Apr2003, Vol. 47 Issue 4, p22 

    The paper assesses the move that was taken by Microsoft Corp. in making personal computers a lot more secure. Although passwords are a cheap and convenient way to authenticate computer users, there are some fundamental problems with the concept as a whole. Passwords must be changed regularly and...

  • Microsoft: Sitting duck - with baggage. Tolly, Kevin // Network World;9/13/2004, Vol. 21 Issue 37, p21 

    This article focuses on issues concerning Microsoft's woes with Internet Explorer and about the delay of WinFS beyond 2006. It notes that the victory over Netscape in the browser wars left Microsoft with virtually all of the browser market. It thus became the target of choice for hackers...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics