MS-ISAC ADVISORY NUMBER: 2014-048
Multiple vulnerabilities have been discovered in Google Chrome that could result in remote code execution. Google Chrome is a web browser used to access the Internet. These vulnerabilities can be exploited if a user visits, or is redirected to, a specially crafted web page. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the affected application. Depending on the privileges associated with the application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Google Chrome versions prior to 35.0.1916.114
- Large and medium government entities: High
- Small government entities:
Password Day 2014
World Password Day 2014 | 05.07
If you're like most people, you've used the same password for years.
Cyber criminals regularly steal passwords by the thousands from the companies and databases that store them. This can put you in hot water if you haven't changed your passwords recently, or use the same password across web sites.
Upgrading your password takes five minutes and can save you hours of trouble dow
Internet Explorer Could Allow Remote Code Execution
CIS Cyber Security Advisory 2014 - 039 - UPDATE
Microsoft has just released an out-of-band security update for Internet Explorer to address the recent zero day vulnerability discovered . The vulnerability is rated Critical. Exploitation of vulnerability could lead to remote code execution. All versions of Internet Explorer are vulnerable.
Recommendation: Patch immediately, after appropriate testing.
Further info: https://technet.microsoft.com/library/security/ms14-021
A vulnerability has been discovered in Microsoft's web browser, Internet Explorer, which could allow an attacker to take complete control of an affected system. Successful exploitation of this vulnerability could result in an attacker gaining the same privileges as the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete d