Microsoft

FBI identified hackers which stolen intellectual property of Xbox One

A group of hackers was identified by the FBI while trying to sale a mockup of the XBox One for $5,000.…

11 years ago

Microsoft confirmed that a faulty patch is causing BlueScreen

Microsoft is investigating on potentially faulty Windows security update that is causing some systems to crash with bluescreen error. Last…

12 years ago

MS Active Directory could allow an attacker to impersonate victims

Experts at Aorato have discovered a flaw in MS Active Directory that could allow an attacker to conduct a pass-the-hash…

12 years ago

Google blocked unauthorized digital certificates issued by NIC India

Google Security experts have detected and blocked unauthorized digital certificates for a number of its domains issued by the NIC…

12 years ago

Microsoft Seized No-IP Domains, Millions dynamic DNS users affected

Executing an order of a Nevada Court, Microsoft has seized domains belonging to the No-IP.com Dynamic DNS Service affecting the…

12 years ago

Microsoft issues the patch for the debated IE critical vulnerabilities

Microsoft has announced the official patch for the critical vulnerability discovered recently in the Internet Explorer. Microsoft has published the "Microsoft…

12 years ago

Outlook Android App stores emails in plain text on mobile

Researchers at Include Security discovered that the Outlook.com Android App leaves user email messages unprotected by default on the mobile…

12 years ago

Windows 8 banned by China for Government Computers

Chinese Authorities ban the use of Microsoft Windows 8 Operating System for Government Computers, the ban is not extended to…

12 years ago

Remote code injection in Microsoft, Yahoo and Orange subdomains

Security researcher Ebrahim Hegazy has identified a remote code injection vulnerability affecting several subdomains of Microsoft, Yahoo, Orange and others.…

12 years ago

NTLM flaws exploitation to access resources in corporate networks

Experts at Imperva have illustrated how to exploit NTLM flaws to conduct a Windows folder Poisoning Attack and steal access rights…

12 years ago

This website uses cookies.