Microsoft Graphics Component Could Allow Remote Code Execution
07 November 2013
Remote exploitation of a memory corruption vulnerability in multiple Microsoft products could allow attackers to execute arbitrary code on the targeted host. The issue occurs with how the TIFF codec in Microsoft's graphics component handles crafted TIFF files. Processing crafted TIFF files can corrupt system memory and create an exploitable condition.
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
While no true security best practices exist, the key is in identifying the security metrics that mean the most to the organization and focusing on those activities to remediate specific vulnerabilities.
FireEye researchers have calculated how much cybercriminals wielding TeslaCrypt and AlphaCrypt have managed to extort. The researchers were able to calculate the sum because most victims preferred to pay the lesser ransom amount using Bitcoin instead of PayPal My Cash cards.
Trust. Itís a small word but it conveys a lot. To many it is the cornerstone of security, because without trust there can be no security. To operate securely in the online world, businesses need to trust the technology they use.