Free Republic 2nd Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $21,784
Woo hoo!! And the first 25% is in!! Thank you all very much!!

Keyword: exploit

Brevity: Headers | « Text »
  • MS Windows Local Privilege Escalation Zero-Day in The Wild

    11/30/2013 10:10:25 AM PST · by Utilizer · 35 replies
    fireeye ^ | November 27, 2013 | Xiaobo Chen and Dan Caselden
    FireEye Labs has identified a new Windows local privilege escalation vulnerability in the wild. The vulnerability cannot be used for remote code execution but could allow a standard user account to execute code in the kernel. Currently, the exploit appears to only work in Windows XP. This local privilege escalation vulnerability is used in-the-wild in conjunction with an Adobe Reader exploit that appears to target a patched vulnerability. The exploit targets Adobe Reader 9.5.4, 10.1.6, 11.0.02 and prior on Windows XP SP3. Those running the latest versions of Adobe Reader should not be affected by this exploit. Post exploitation, the...
  • Democrats Love to Exploit Sandy Hook Atrocities (Video)

    04/02/2013 8:21:17 PM PDT · by publius321 · 5 replies
    Innocent lives mean Nothing to Obama, Pelosi, Reed, Schumer, Franken & Wasserman Schultz. They are lovers of death and have the blood of 50 million innocent babies on their hands. Their blood lust is insatiable and they rejoice inside when these murders occur. They may not directly cause them but they probably would as often as possible if they were certain they would get away with it... (Video)
  • Child Abuse & The Obama Campaign

    10/30/2012 8:51:07 PM PDT · by publius321
    Some troubling observations & "Jonesian" similarities. (video)
  • Zagat trying to exploit 9/11 for profit

    09/10/2011 8:50:12 AM PDT · by NowApproachingMidnight · 5 replies
    Email | 9/10/11 | Self
    9/11: Stories of Courage, Heroism and Generosity We are pleased to announce 9/11: Stories of Courage, Heroism and Generosity with an introduction from Tim Zagat, Co-founder and CEO of Zagat Survey, along with contributions from former New York City Mayor Rudy Giuliani and former New York Governor George Pataki. Upon reflection of the 9/11 attacks, the random acts of kindness displayed by selfless individuals are too often overlooked. As the 10-year anniversary of this fateful day approaches, Zagat honors these heroes for their contributions to rebuilding and uniting a country in the wake of destruction. Order Now: Regular Price: $24.95...
  • Warning: E-mail virus spreading (DHS investigating?)

    09/09/2010 1:57:15 PM PDT · by Rutles4Ever · 35 replies
    Twitter ^ | 09/09/2010 | Jason Ryan
    "Here You Have" Virus Email spreading. DHS US-CERT Computer Emergency Readiness Team looking into issue. will issue bulletin.
  • "Millions" Of Home Routers Vulnerable To Web Hack

    07/16/2010 9:38:35 AM PDT · by ShadowAce · 18 replies · 3+ views
    Forbes ^ | 13 July 2010 | Andy Greenberg
    The upcoming Black Hat security conference in Las Vegas offers an annual parade of security researchers revealing new ways to break various elements of the Internet. But few of the talks have titles quite as alarming as one on this year's schedule: "How to Hack Millions of Routers."Craig Heffner, a researcher with Maryland-based security consultancy Seismic, plans to release a software tool at the conference later this month that he says could be used on about half the existing models of home routers, including most Linksys, Dell, and Verizon Fios or DSL versions. Users who connect to the Internet through...
  • IBM unleashes virus on AusCERT delegates

    05/21/2010 8:14:34 PM PDT · by smokingfrog · 11 replies · 527+ views ^ | May 21, 2010 | Nate Cochrane
    Malware-infected USB key the culprit. Delegates to AusCERT, Australia's premier information security event held this week on the Gold Coast, have taken home a little of the stuff they spent the week agonising over - a virus. In an email this afternoon, IBM advised visitors to its AusCERT booth that its complimentary USB key was infected with a virus. An IBM spokesman and conference organisers confirmed the email was genuine. It is the second time in two years that clumsy exhibitors have infected their customers with viruses. "At the AusCERT conference this week, you may have collected a complimentary USB...
  • Arianna Huffington Exploits Coal Mining Tragedy, Cries for Bigger Government

    04/14/2010 7:17:56 AM PDT · by 198ml · 23 replies · 491+ views
    Newsbusters ^ | 04/14/10 | Anthony Kang
    The co-founder of progressive blog The Huffington Post, Arianna Huffington, has attributed the West Virginia mining disaster, along with virtually every other accident under the sun, as a direct result of small-government and corporate greed in the April 13 Huffpo column "The West Virginia Mining Disaster and the Financial Crisis Have the Same Root Cause." "Officials say it's too soon to pinpoint the exact cause of the tragic explosion at the Upper Big Branch mine in West Virginia that took the lives of 29 miners, but we certainly know enough to identify the root cause," Huffington began. "It's the same...
  • Racebaiting D.S.A. Marxists Exploit “Immigration Reform” to Further Socialist Agenda

    04/13/2010 12:50:59 PM PDT · by Nachum · 5 replies · 145+ views
    keywiki blog ^ | 4/13/10 | Trevor Loudon
    Democratic Socialists of America (DSA) is an highly influential organization. While only 6,000 strong, DSA has considerable strength in the labor movement, non profits, education and inside the Democratic Party. While Marxist based, DSA’s innocuous sounding name, allows the organization to operate in ways and places that their allies in the the Communist Party USA cannot. After using its clout to push through “healthcare reform” DSA is now using its influence in the giant union SEIU, to promote “immigration reform”.
  • Charlie Miller to reveal 20 zero day security holes in Mac OS X

    03/25/2010 1:15:01 PM PDT · by for-q-clinton · 28 replies · 522+ views
    Engadget ^ | 19 Mar 2010 | Darren Murph
    Say, Charles -- it's been awhile! But we're pleased as punch to see that you're back to your old ways, poking around within OS X's mainframe just looking for ways to remotely control the system, snag credit card data and download a few interoffice love letters that are carefully stashed 15 folders down within 'Documents.' The famed Apple security expert is planning yet another slam on OS X at CanSecWest, where he'll reveal no fewer than 20 zero day security holes within OS X. According to Miller, "OS X has a large attack surface consisting of open source components, closed...
  • 'Jews exploit Holocaust as propaganda'

    01/25/2010 3:04:18 PM PST · by Nachum · 33 replies · 781+ views
    Jerusalem Post ^ | 1/25/10 | staff
    The Holocaust only gets media coverage because of affluent Jews' financial backing, military might and lobbying fronts, presenting a skewed version of events to the world, a high-ranking Polish bishop told a Catholic news portal on Monday. Tadeusz Pieronek, a Polish bishop and professor and a friend of the last pope, John Paul II, claimed that "the Holocaust as such is a Jewish invention" promoted in the press by Jews to gain support for Israel. Pieronek told the Web site Pontifex.roma that while the Holocaust was not exclusively Jewish, Jews had monopolized it in lieu of encouraging "serious historical debate,...
  • New attack proves critical Windows bug 'highly exploitable'

    01/30/2008 10:20:42 AM PST · by ShadowAce · 7 replies · 112+ views
    ComputerWorld ^ | 30 January 2008 | Gregg Keizer
    Security researchers yesterday said they'd discredited Microsoft's claim that the year's first critical Windows vulnerability would be "difficult and unlikely" to be exploited by attackers. On Tuesday, Immunity Inc. updated a working exploit for the TCP/IP flaw spelled out Jan. 8 in Microsoft's MS08-001 security bulletin, and posted a Flash demonstration of the attack on its Web site. The exploit, which was released to customers of its CANVAS penetration testing software -- but is not available to the public -- was a revised version of code first issued two weeks ago. "This demonstrates conclusively that the MS08-001 IGMPv3 vulnerability is...
  • Coming to a Truck Stop Near You (Porn-Fueled Sex Slavery and Child Prostitutes in the USA)

    01/15/2008 6:55:08 AM PST · by Mrs. Don-o · 117 replies · 11,307+ views
    National Review ^ | January 15, 2008 | Ann Morse
    Fourteen-year-old Cara and her 15-year-old cousin, Stacy (not their real names) walked out of their homes in Toledo, Ohio on a rainy May day in 2005 to get milkshakes. A few blocks away, a couple driving a Lincoln Continental pulled alongside the cousins and asked if they wanted a lift. Believing the man’s claim to be a schoolmate’s father, the girls stepped into the car — and entered a nightmare world of sexual slavery. The couple drove the girls to a house and locked them in. As their families frantically searched for them, the teens were sold over and over...
  • Report: PDF files used to attack computers

    10/27/2007 5:40:16 PM PDT · by holymoly · 24 replies · 124+ views
    ZDNet ^ | Oct 27, 2007 | n/a
    E-mails containing malicious PDF files have been putting computers at risk since Friday, Finnish security software firm F-Secure said on Saturday. "The e-mails sent in bulk looked like credit card statements, and contained an attachment called 'report.pdf'," its Chief Research Officer Mikko Hypponen said in a statement. When such PDF files are viewed on vulnerable machines, they start downloading software from servers in Malaysia or Sweden, which are now being cleaned, he said. "There will be more such attacks." "We are worried about this case, as PDF attachments are typically not filtered at e-mail gateways." A security update for Adobe...
  • Another good reason to stop using telnet (Major hack against Solaris)

    02/12/2007 10:35:07 PM PST · by zeugma · 22 replies · 549+ views
    SANS ^ | 2007-02-12 | donald smith
    There is a major zero day bug announced in solaris 10 and 11 with the telnet and login combination. It has been verified. In my opinion NOBODY be should running telnet open to the internet. Versions of Solaris 9 and lower do not appear to have this vulnerability. The issue: The telnet daemon passes switches directly to the login process which looks for a switch that allows root to login to any account without a password. If your telnet daemon is running as root it allows unauthenticated remote logins. Telnet should be disabled. Since 1994 the team has recommended...
  • IE Bug Can Be Exploited Via E-mail

    09/21/2006 5:31:55 PM PDT · by Eagle9 · 52 replies · 1,341+ views
    TechWeb ^ | September 21, 2006 | Gregg Keizer
    Exploits against the unpatched vulnerability in Microsoft's Internet Explorer are increasing and attackers are gathering momentum, researchers said Thursday. They warned that the problem would become worse if cyber criminals attack via e-mail next. "It might come to nothing, but it feels like a storm's coming," said Roger Thompson, the chief technology officer at Exploit Prevention Labs. "The potential is there. Call it a storm watch, not a storm warning." At least two different exploits have appeared this week, said Thompson, one linked to the Russian-made hacker exploit kit called WebAttacker, the other posted early Thursday on the xSec gray-hat...
  • How To Defend Against IE's VML Bug

    09/20/2006 12:41:51 PM PDT · by Eagle9 · 61 replies · 1,796+ views
    TechWeb ^ | September 20, 2006 | Gregg Keizer
    Although Microsoft has acknowledged that in-the-wild exploits are taking advantage of an unpatched flaw in Internet Explorer, the developer has not committed to cranking out a fix before next month's regularly-scheduled update on Oct. 10. Users who want to protect themselves now, however, do have options. Disable the vulnerable .dll: In the security advisory posted yesterday, Microsoft suggested that users can disable the vulnerable "Vgx.dll" from the command line. -- Click Start, choose Run, and then type -- regsvr32 -u "%ProgramFiles%\Common Files\Microsoft Shared\VGX\vgx.dll -- Click OK, then click OK again in the confirmation dialog that appears. To undo the command,...
  • New Exploit Rocks IE, Downloads Scores Of Spyware, Adware

    09/19/2006 5:36:00 PM PDT · by Eagle9 · 94 replies · 2,911+ views
    TechWeb ^ | September 19, 2006 | Gregg Keizer
    An unpatched vulnerability in all editions of Microsoft's Internet Explorer browser is being exploited, security researchers said Tuesday, with the attack dumping a broad range of adware, spyware, and Trojans onto PCs whose users simply surf to an infected or malicious site. First reported by Sunbelt Software -- although rival Internet Security Systems claimed it was the first to discover the bug -- the vulnerability is in how IE renders VML (Vector Mark-up Language), an extension of XML that defines on-the-Web images in vector graphics format. The previously unknown -- and thus unpatched -- bug inside IE is already being...
  • Second zero-day Excel flaw emerges

    06/20/2006 7:47:56 PM PDT · by Swordmaker · 16 replies · 519+ views
    CNET ^ | Published: June 20, 2006, 12:53 PM PDT | By Joris Evers
    Attack code for a new security hole in Excel has surfaced on the Internet, just as Microsoft is scrambling to respond to a separate bug in the spreadsheet program. The latest vulnerability could cause Excel to crash after a malicious file is opened, according to an alert Symantec sent to customers on Monday. The security company also said there was a risk that an intruder could commandeer a PC. "Attackers may also be able to execute arbitrary code…but this has not been confirmed," it said. The security hole exists because Excel fails to properly check user-supplied input before copying it...
  • 'Critical' IE bug threatens PC users

    03/27/2006 6:58:48 PM PST · by Ernest_at_the_Beach · 43 replies · 1,238+ views ^ | Monday 27th March 2006 09:14 GMT | Ciara O'Brien,
    A dangerous new exploit in Internet Explorer could put PCs and data at risk, Microsoft has admitted. The flaw, for which code has already been published on the internet, could be exploited to set an email-borne virus free on the unsuspecting public. Potential viruses could come as an attachment that conceals the code, or could possibly redirect users to a site that will unleash the code on the user's machine, leaving the computer open to remote attack. Once the PC is being controlled by a malicious user, it can then be used to launch attacks on other PCs. Even supposedly...
  • Microsoft: Vista won't get a backdoor

    03/04/2006 6:22:54 AM PST · by Panerai · 53 replies · 1,168+ views
    Cnet ^ | 03/03/2006 | By Joris Evers
    Windows Vista won't have a backdoor that could be used by police forces to get into encrypted files, Microsoft has stressed. In February, a BBC News story suggested that the British government was in discussions with Microsoft over backdoor access to the operating system. A backdoor is a method of bypassing normal authentication to gain access to a computer without to the PC user knowing. But Microsoft has now quelled the suggestion that law enforcement might get such access. "Microsoft has not and will not put 'backdoors' into Windows," a company representative said in a statement sent via e-mail. The...
  • The Windows MetaFile Backdoor?

    01/16/2006 9:48:37 AM PST · by ShadowAce · 106 replies · 2,183+ views
    Security Now! ^ | 13 January 2006 | Steve Gibson/Leo LaPorte
    This is a transcript from a show Steve Gibson did with Leo LaPorte. The link to the audio is at the above link. Also, I will excerpt a little of the relevant information here.Steve: And so, you know, because I'm a developer when I'm not being a hacker, I wanted to understand - oh, and the other thing is, I want to write a robust testing application, you know, that always works all the time. So I wanted to know, like, okay, what bytes have to be set which way, what matters, what doesn't. Because, you know, that's the way...
  • WMF (Windows meta file) exploit

    01/02/2006 5:07:56 AM PST · by KeyWest · 49 replies · 2,054+ views
    The SANS Institute ^ | January 2, 2005 | Various
    Looking forward to the week ahead, I find myself in the very peculiar position of having to say something that I don't believe has ever been said here in the Handler's diary before: "Please, trust us." I've written more than a few diaries, and I've often been silly or said funny things, but now, I'm being as straightforward and honest as I can possibly be: the Microsoft WMF vulnerability is bad. It is very, very bad.
  • Microsoft To Patch Windows on January 10th; Attack Spreads

    01/03/2006 11:42:23 AM PST · by HAL9000 · 52 replies · 3,487+ views
    Dow Jones News Service (excerpt) ^ | January 3, 2006 | Chris Reiter
    Excerpt - NEW YORK -(Dow Jones)- Microsoft Corp. (MSFT) plans to release a patch for a new security flaw at its next scheduled update release on Jan. 10, leaving users largely unprotected until then from a rapidly spreading computer virus strain. "Microsoft's delay is inexcusable," said Alan Paller, director of research at computer security group SANS Institute. "There's no excuse other than incompetence and negligence." "It's a problem that there's no known solution from Microsoft," said Alfred Huger, senior director of engineering at Symantec Corp.'s (SYMC) security response team. SANS Institute, via its Internet Storm Center, has taken the unusual...
  • Windows PCs face ‘huge’ virus threat

    01/02/2006 3:54:03 PM PST · by Swordmaker · 204 replies · 7,105+ views
    Financial Times via Drudge ^ | January 2 2006 18:18 | By Kevin Allison in San Francisco
    Computer security experts were grappling with the threat of a newweakness in Microsoft’s Windows operating system that could put hundreds of millions of PCs at risk of infection by spyware or viruses. The news marks the latest security setback for Microsoft, the world’s biggest software company, whose Windows operating system is a favourite target for hackers. “The potential [security threat] is huge,” said Mikko Hyppönen, chief research officer at F-Secure, an antivirus company. “It’s probably bigger than for any other vulnerability we’ve seen. Any version of Windows is vulnerable right now.” The flaw, which allows hackers to infect computers using...
  • New exploit released for the WMF vulnerability - YELLOW (NEW)

    12/31/2005 4:26:16 PM PST · by Salo · 28 replies · 1,114+ views
    SANS ^ | 12/31/05 | Tom Liston
    * New exploit released for the WMF vulnerability - YELLOW (NEW) Published: 2006-01-01, Last Updated: 2006-01-01 00:06:40 UTC by Tom Liston (Version: 6(click to highlight changes)) New exploit On New Year's eve the defenders got a 'nice' present from the full disclosure community. The source code claims to be made by the folks at metasploit and xfocus, together with an anonymous source. The exploit generates files: * with a random size; * no .wmf extension, (.jpg), but could be any other image extension actually; * a random piece of junk in front of the bad call; carefully crafted to be...
  • Potential new unpatched IE exploit ? ~ Yes...may affect other Browsers also...

    12/28/2005 2:55:03 PM PST · by Ernest_at_the_Beach · 69 replies · 3,196+ views
    Websense Security Labs ^ | Dec 28 2005 11:19AM | Websense Security Labs Blog Staff
    This alert is a follow-up to a post made yesterday on our blog: Websense® Security Labs™ has discovered numerous websites exploiting an unpatched Windows vulnerability in the handling of .WMF image files. The websites which have been uncovered at this point are using the exploit to distribute Spyware applications and other Potentially Unwanted Soware. The user's desktop background is replaced with a message warning of a spyware infection and a "spyware cleaning" application is launched. This application prompts the user to enter credit card information in order to remove the detected spyware. The background image used and the "spyware...
  • Exploit Released for Unpatched Windows Flaw

    12/28/2005 5:45:47 PM PST · by Salo · 25 replies · 1,376+ views
    Washington ComPost ^ | 12/28/05 | Brian Krebs
    Security researchers have released instructions for exploiting a previously unknown security hole in Windows XP and Windows 2003 Web Server with all of the latest patches applied.
  • Exploit code chases two Firefox flaws (May 9, 2005)

    12/12/2005 8:14:49 PM PST · by CometBaby · 44 replies · 1,077+ views
    ZDnet ^ | May 9, 2005 | Dawn Kawamotot
    If you use the Firefox browser .. read this !! .. Two vulnerabilities in the popular Firefox browser have been rated "extremely critical" because exploit code is now available to take advantage of them. The cross-site scripting and remote system access flaws were discovered in Firefox version 1.0.3, but other versions may also be affected, said security company Secunia, which issued the ratings Sunday.
  • Unpatched Firefox 1.5 exploit made public

    12/08/2005 4:06:06 PM PST · by zeugma · 157 replies · 2,627+ views
    Cnet ^ | 12/08/2005 | Dawn Kawamoto
    Exploit code for the latest version of open-source browser Firefox was published Wednesday, potentially putting users at risk of a denial-of-service attack. The exploit code takes advantage of a bug in the recently released Firefox 1.5, running on Windows XP with Service Pack 2. Firefox, which initially debuted over a year ago, has moved swiftly to capture 8 percent of the browser market. The latest Firefox flaw exists in the history.dat file, which stores information from Web sites users have visited with the Firefox 1.5 browser, according to a posting on the Internet Storm Center, which monitors online threats. "If...
  • Spy Axe 3.0

    12/06/2005 8:16:34 PM PST · by Carling · 87 replies · 5,144+ views
    My PC ^ | 12/6/05 | Me
    I hate vanity posts, but I am wondering if anyone in FR land knows anything about the Spy Axe 3.0 virus. It has set up shop in my toolbar and has hijacked my home page. eTrust isn't touching it. Help?!?!

    12/06/2005 6:38:12 PM PST · by CAWats · 61 replies · 8,523+ views
    12-06-2005 | Cawats
    My computer apparently picked up a virus from I have a pop-up window saying I have spyware and "it is recommended to use antispyware tools to prevent data loss." Everytime I close the popup it pops up again. I got tired of closing it and installed it then removed it with "Add/Remove Software" in the control panel. The pop-up is back. Can anyone help?
  • IE Exploit At Large, Microsoft Urges Scan

    11/30/2005 11:42:46 AM PST · by Eagle9 · 29 replies · 974+ views
    TechWeb News ^ | November 30, 2005 | Greg Keizer
    Microsoft acknowledged Tuesday that malicious software targeting an unpatched bug in Internet Explorer is on the loose, and urged users to run a complete system scan on its new Windows Live Safety Center -- which has a quirk of its own -- to detect and delete the code. In an update of a security advisory issued Nov. 21, Microsoft noted that both proof-of-concept code and an exploit are in circulation. The exploit can compromise PCs running IE on a host of the company's operating systems, including Windows 98, Windows Me, Windows 2000, and Windows XP. The bug, which was reported...
  • Sony Rootkits: A Sign Of Security Industry Failure (List of 52 CD Titles)

    11/18/2005 3:16:07 PM PST · by Eagle9 · 32 replies · 1,324+ views
    TechWeb News ^ | November 18, 2005 | Gregg Keizer
    Sony's controversial copy-protection scheme had been in use for seven months before its cloaking rootkit was discovered, leading one analyst to question the effectiveness of the security industry. "[For] at least for seven months, Sony BMG Music CD buyers have been installing rootkits on their PCs. Why then did no security software vendor detect a problem and alert customers?" asked Joe Wilcox, an analyst with JupiterResearch. "Where the failure is, that's the question mark. Is it an indictment of how consumers view security software, that they have a sense of false protection, even when they don't update their anti-virus and...
  • MS' Reaction to Sony's Rootkit Raises Some Questions

    11/17/2005 6:09:52 AM PST · by ShadowAce · 79 replies · 1,658+ views
    Groklaw ^ | 13 November 2005 | Pamela Jones
    When the news first broke in the mainstream press that Windows expert and blogger Mark Russinovich (he wrote a book about Windows for Microsoft) had found that Sony's anti-piracy efforts had gone too far and that Sony's DRM was installing an undetectable rootkit on customers' computers which they couldn't safely remove, the first reaction from Microsoft was guarded. They were concerned, they said, and were evaluating what, if anything, to do: Microsoft, which also ships an anti-spyware program, recently renamed "Windows Defender," hasn't yet decided whether it will also flag the Sony DRM software as malicious code, the spokesperson said....
  • Sony has infected over one-half million world wide nets incl U.S. Military

    11/15/2005 1:43:21 PM PST · by dickmc · 109 replies · 4,396+ views
    Welcome to Planet Sony ^ | 2005-11-15 09:28 | Dan Kaminsky
    More than one-half million networks infected by Sony including U.S. military and various countries. Dan Kaminsky, ,is the expert who broke this and did the work. His U.S. and Europe infection maps are shown below and are frightening. Dan did a hell of a good job. Search Google News for "sony numbers trouble" for more in an excellent article today that is very worth reading.
  • Outlook Express tech help needed (VANITY)

    12/05/2003 10:02:05 PM PST · by ILBBACH · 23 replies · 371+ views
    ILBBACH | 12/6/03 | ILBBACH
    I have been receiving an email since mid-afternoon. I guess its really huge and I tried to get the program to quit, but it won't. How do I stop this? PLEASE HELP!
  • Microsoft makes Outlook Express U-turn

    08/15/2003 10:30:34 AM PDT · by HAL9000 · 131 replies · 1,007+ views ^ | August 15, 2003
    Just days after announcing that it planned to halt development on Outlook Express, Microsoft has been forced to change its position following internal confusion and an outcry from customers. As reported earlier this week on Microsoft had planned to stop product development on Outlook Express, which forms part of the Internet Explorer code bundled with consumer versions of Windows. At the time Dan Leach, Office product manager, said: "The technology doesn't go away, but no new work is being done." Under that vision, consumers would have been directed towards the company's MSN software, while businesses would be encouraged...
  • Microsoft kills off Outlook Express

    08/13/2003 2:52:32 PM PDT · by HAL9000 · 65 replies · 614+ views
    ZDNet ^ | August 13, 2003 | Angus Kidman
    It might be the world's most widely distributed e-mail client, but Microsoft has confirmed that it has no intention of further developing Outlook Express. "[Outlook Express] just sits where it is," said Dan Leach, lead product manager for Microsoft's information worker product management group. "The technology doesn't go away, but no new work is being done. It is consumer e-mail in an early iteration, and our investment in the consumer space is now focused around Hotmail and MSN. That's where we're putting the emphasis in terms of new investment and new development work." While Outlook Express has always been...
  • Microsoft Outlook Express Patch Flawed

    10/11/2002 9:45:53 PM PDT · by Ernest_at_the_Beach · 8 replies · 328+ views
    EXTREMETECH .com ^ | October 11, 2002 | Dennis Fisher, eWEEK
    <p>Microsoft Corp. on Friday said that a patch it released Thursday for an Outlook Express vulnerability erroneously tells users they need a different version of Internet Explorer in order to install the fix. In fact, the patch requires IE 6, but users who have installed Service Pack 1 for the browser are already protected against the new flaw. Thus when these users try to install the new patch, they receive an error message.</p>
  • Outlook Express flaw speeds hacking

    10/11/2002 11:31:02 AM PDT · by Bush2000 · 3 replies · 242+ views
    CNET ^ | October 11, 2002, 10:40 AM PT | Robert Lemos
    Outlook Express flaw speeds hacking By Robert Lemos Staff Writer, CNET October 11, 2002, 10:40 AM PT Microsoft warned Outlook Express users late Thursday that a software flaw could allow an online vandal to control their computers. A critical vulnerability in the e-mail reader could allow an attacker to send a specially formatted message that would crash the software and potentially take control of the recipient's computer. The flaw occurs in how the software handles messages that include components using secure MIME (multipurpose Internet mail extensions), a standard that allows e-mail messages to contain encrypted data and digital signatures....
  • Outlook Express - much problems

    03/06/2002 3:54:27 PM PST · by Hot Tabasco · 31 replies · 956+ views
    March 6, 2002 | zcat
    My system: Dell Dimension 8100 with windows ME which I have since upgraded to 2000 I cannot utilize Outlook Express. Everything is read-only, if I attempt to forward, reply or even open, I get the following message: msimn.exe has generated errors and will be closed by windows. You will need to restart the programs.Couple weeks ago had a major break down, lost files, computer wasnt working properly, and while on phone to Dell support, system died. Dell sent me a new mother board which I have since installed. Downloaded IE 6.0, and have since uninstalled it and loaded 5.5. Still ...
  • Severe(?) Outlook/Outlook Express Security Problem

    07/22/2002 7:33:24 AM PDT · by MikeJ · 17 replies · 487+ views
    Several vulnerabilities were reported in Outlook Express (OE). A remote user can send malicious e-mail with an attachment that will bypass OE's malicious file type filter and misrepresent the name and size of the file.
  • Now, Every Keystroke Can Betray You

    09/18/2005 5:35:49 PM PDT · by Crackingham · 52 replies · 2,567+ views
    LA Times ^ | 9/18/05 | Joseph Menn
    Bank customers know to shield their ATM passwords from prying eyes. But with the rise of online banking, computer users may not realize electronic snoops might be peeking over their shoulder every time they type. In a twist on online fraud, hackers and identity thieves are infecting computers with increasingly sophisticated programs that record bank passwords and other key financial data and send them to crooks over the Internet. That's what happened to Tim Brown, who had account information swiped out of the PC at his Simi Valley store. "It's scary they could see my keystrokes," said Brown, owner of...
  • NBC, CNN Say They're Opening Full-Time News Bureaus in New Orleans

    09/16/2005 12:34:02 PM PDT · by jmc1969 · 22 replies · 601+ views
    NEW YORK (AP) - Anticipating that the Hurricane Katrina recovery will be a big story for months to come, both NBC and CNN said Thursday they are opening full-time news bureaus in New Orleans. NBC News said its bureau will operate out of space at WDSU-TV, its local affiliate, and will help the network and MSNBC originate shows in the city. Brian Williams anchored the "NBC Nightly News" from there on Thursday in advance of President Bush's speech. Frieda Morris, currently chief of NBC's Atlanta bureau who has been living out of a trailer in Biloxi, Miss., since the storm,...
  • Planned Parenthood Continues to Exploit Hurricane Katrina Victims

    09/08/2005 12:32:13 PM PDT · by Lorianne · 30 replies · 733+ views
    Life News ^ | 07 September 2005 | Steven Ertelt
    New Orleans, LA ( -- Pro-life advocates say Planned Parenthood, the nation's largest abortion business, continues to exploit victims of Hurricane Katrina. The organization previously said it would provide morning after pills to victims, instead of food or shelter, and is now raising money off of the hurricane for its local abortion centers. On its national web site, Planned Parenthood solicits funds for Hurricane Katrina support efforts. In fine print, the abortion advocacy group explains that all of the money raised will be used to support its local abortion businesses. Under a headline "Help Those Affected by the Hurricane," Planned...
  • Warnings of Katrina E-Mail Scams

    09/03/2005 4:15:59 AM PDT · by Our_Man_In_Gough_Island · 13 replies · 731+ views
    BBC ^ | 2 Sept 2005 | Staff
    Computer users are being urged to be on guard for a bogus e-mail that pretends to offer news updates about Hurricane Katrina as a means to infect their PCs. The malicious e-mail gives a brief news bulletin on the disaster before urging people to click "read more" and be taken to the full story on a website. Yet once directed to the website, a virus is sent to the user's computer. People are also being told to watch out for fraudulent e-mail scams pretending to raise cash for Katrina victims. It's sickening to think that hackers are prepared to exploit...
  • Microsoft sees 3 'critical' Windows security flaws

    08/09/2005 2:03:40 PM PDT · by Fractal Trader · 49 replies · 1,297+ views
    AP via ^ | 9 August 2005
    Microsoft Corp. warned users of its Windows operating system on Tuesday of three newly found "critical" security flaws in its software, including one that could allow attackers to take complete control of a computer. Computer security experts urged users to download and install the patches, which are available at "Users (should) apply the updates as quickly as possible," said Oliver Friedrichs, senior manager of Symantec Security Response, part of security software company Symantec Corp. SYMC.O. Microsoft said that vulnerabilities exist in its Internet Explorer Web browser, the most severe of which could allow an attacker to take complete control...
  • Microsoft fixes serious Windows flaws

    08/09/2005 2:56:44 PM PDT · by Panerai · 78 replies · 1,798+ views
    Cnet News ^ | August 9, 2005 | Joris Evers
    Microsoft on Tuesday issued alerts on several security flaws in Windows, the most serious of which could allow an attacker to gain control over a victim's computer. Microsoft released six security bulletins as part of its monthly patching cycle, three of which it deems "critical." The Redmond, Wash., software gives that rating to any security issue that could allow a malicious Internet worm to spread without any action required on the part of the user. One bulletin addresses three flaws in Internet Explorer. Of all the issues Microsoft offered fixes for Tuesday, these put users at most risk of attack,...
  • Spyware Phishing Now a World-Wide Epidemic

    07/19/2005 10:06:47 PM PDT · by ex-Texan · 16 replies · 906+ views ^ | 7/19/205 | Staff Writers
    Nova Scotia July 19, 2005 -- SpyCop today announced that the use of commercial monitoring spy software is on the rise in Internet phishing schemes, the latest scam used to steal personal information and even entire identities. The Anti-Phishing Working Group, web site at, explains: "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials... Technical subterfuge schemes plant crimeware onto PCs to steal credentials directly, often using Trojan keylogger spyware." The commercial spy software market has made available over 525 payware spy programs which include URL recorders, keyloggers, chat...