Make Homepage | Add To Favorites | Print Page | Submit News | Feedback | Contact | 

Your Technical Computer Information Resource!  
     
  OS Technical Updates [Page: 1 of 273] @ TACKtech Corp.  

02.18.2015 - MS15-010 - Critical: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution (3036220) - Version: 1.1



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.1 (February 18, 2015): Bulletin revised to add an Update FAQ that explains why there are two packages on the Microsoft Download Center pages for affected editions of Windows Server 2003, Windows Server 2008, and Windows Vista. The additional package (3037639) is not needed to be protected from the vulnerabilities addressed by the 3013455 update; it simply corrects a text quality problem that some customers experienced after installing the 3013455 update on the indicated systems.
Summary: This security update resolves six privately reported vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. To exploit the vulnerability an attacker would need to convince a user to open a specially crafted document or visit an untrusted website that contains embedded TrueType Fonts.
Full View / NID: 52818 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-009 - Critical: Security Update for Internet Explorer (3034682) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves one publicly disclosed and forty privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 52769 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-016 - Important: Vulnerability in Microsoft Graphics Component Could Allow Information Disclosure (3029944) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow information disclosure if a user browses to a website containing a specially crafted TIFF image. This vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.
Full View / NID: 52768 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-017 - Important: Vulnerability in Virtual Machine Manager Could Allow Elevation of Privilege (3035898) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Virtual Machine Manager (VMM). The vulnerability could allow elevation of privilege if an attacker logs on an affected system. An attacker must have valid Active Directory logon credentials and be able to log on with those credentials to exploit the vulnerability.
Full View / NID: 52767 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-011 - Critical: Vulnerability in Group Policy Could Allow Remote Code Execution (3000483) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. A remote code execution vulnerability exists in how group policy receives and applies connection data when a domain-joined system connects to a domain controller. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Full View / NID: 52766 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-010 - Critical: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Remote Code Execution (3036220) - Version: 1.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves six privately reported vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted website that contains embedded TrueType fonts. To exploit the vulnerability an attacker would need to convince a user to open a specially crafted document or visit an untrusted website that contains embedded TrueType Fonts.
Full View / NID: 52720 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-015 - Important: Vulnerability in Microsoft Windows Could Allow Elevation of Privilege (3031432) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an authenticated attacker acquires administrator credentials and runs a specially crafted application designed to increase privileges.
Full View / NID: 52713 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-014 - Important: Vulnerability in Group Policy Could Allow Security Feature Bypass (3004361) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 10, 2015): V1.0 (February 10, 2015): Bulletin published.
Summary: Bulletin published.
Full View / NID: 52712 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-013 - Important: Vulnerability in Microsoft Office Could Allow Security Feature Bypass (3033857) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves one publicly disclosed vulnerability in Microsoft Office. The vulnerability could allow security feature bypass if a user opens a specially crafted Microsoft Office file. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this security feature bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, to run arbitrary code.
Full View / NID: 52711 / Submitted by: The Zilla of Zuron

02.10.2015 - MS15-012 - Important: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3032328) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (February 10, 2015): Bulletin published.
Summary: This security update resolves three privately reported vulnerabilities in Microsoft Office. The vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 52710 / Submitted by: The Zilla of Zuron

02.10.2015 - MS14-083 - Important: Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (3017347) - Version: 2.0



View Microsoft related news. Severity Rating: Important
Revision Note: V2.0 (February 10, 2015): Bulletin rereleased to announce the availability of an additional update package for Microsoft Excel Viewer (2920791) that addresses the vulnerabilities discussed in this bulletin. Note that the 2920791 update also addresses a vulnerability discussed in MS15-012, which is being released concurrently. Microsoft recommends that customers running Microsoft Excel Viewer apply the 2920791 update at their earliest convenience. See the Affected Software table for the download link.
Summary: This security update resolves two privately reported vulnerabilities in Microsoft Excel. The vulnerabilities could allow remote code execution if an attacker convinces a user to open or preview a specially crafted Microsoft Excel file in an affected version of Microsoft Office software. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 52709 / Submitted by: The Zilla of Zuron

01.30.2015 - Scottish Gaelic language support now available for Microsoft Office



View Microsoft-Press related news. *Goireas-taice litreachaidh ri fhaotainn ann an Gàidhlig a-nis airson Microsoft Office Hot on the heels of Burns Night, Microsoft announced earlier this week that Scottish Gaelic is the latest addition to the 95 languages and dialects supported by proofing functionality in Microsoft Office. It means that 60,000 speakers of the … Read more »
Full View / NID: 52559 / Submitted by: The Zilla of Zuron

01.27.2015 - Windows 10: The next chapter



View Microsoft-Press related news. Yesterday we announced a number of new and exciting elements in the next phase of Windows 10. With a wide range of experiences as well as two new devices - the Windows experience is now being extended across devices and scenarios - from large screens to no screens at all. … Read more »
Full View / NID: 52560 / Submitted by: The Zilla of Zuron

01.22.2015 - The next phase of Windows : Windows 10  



View Microsoft-Press related news.

Earlier today we announced a number of new and exciting elements in the next phase of Windows 10. With a wide range of experiences as well as two new devices - the Windows experience is now being extended across devices and scenarios - from large screens to no screens at all. For a comprehensive recap of today’s news please check out this blog post from our executive vice president, Operating Systems Group – Terry Myerson

The new Windows 10
January 22, 2015

There are a number of new and exciting elements in the next phase of Windows 10
January 22, 2015

The Windows experience is now being extended across devices and scenarios
January 22, 2015

Full View / NID: 52428 / Submitted by: The Zilla of Zuron

01.22.2015 - Project based learning for schools comes to life with new BBC Earth natural history film, Enchanted Kingdom



View Microsoft-Press related news.

At BETT today, Microsoft is launching a series of educational aids it has developed in partnership with teaching school Broadclyst Primary in Devon, using BBC Earth Films’ 3D spectacular, Enchanted Kingdom. These introduce ‘project based learning’ into the classroom – a method of teaching that encourages students to improve their engagement in the curriculum by exploring the world around them, developing solutions to challenges in a creative and collaborative learning environment. Broadclyst has developed the lesson plans within the education aids and tested them in a classroom environment. They cover topics from across the curriculum from the humanities to the sciences, and coding. From today, this innovative new project based learning toolkit is now available to schools and educators up and down the country.

Enchanted Kingdom is ‘the most ambitious 3D nature film ever made’
January 21, 2015


Enchanted Kingdom is ‘the most ambitious 3D nature film ever made’, taking audiences on a journey of discovery through the wilds of Africa. Narrated by Idris Elba, star of The Wire, Luther and Oscar-nominated Mandela: Long Walk to Freedom, the movie brings together cutting edge 3D technology, Hollywood production expertise and the best nature film making to bring to life the incredible wonders, stories and characters of our planet. Enchanted Kingdom, set to be released in cinema and on Blu-ray, 3D Blu-ray and DVD in the UK later this year, was released in Japan in 2014 and was the third top grossing film of the year.

Jonathan Bishop, Headteacher at Broadclyst, explains: “Our partnership with Microsoft has allowed us to extend the magic of this film to the classroom. The broad range of landscapes, creatures and behaviours covered in the film make it an incredibly rich resource for education.”

“The projects we have developed have captured the imagination of our students. As an example, one of the scenes in the film is set in the ‘frozen spires’ of Mount Kenya. We tasked our students with designing a camera case that could withstand such a frozen environment and encouraged them to use software packages to work together and create a solution. Students use Microsoft cloud-based collaboration tools such as Office 365, Office Mix, OneNote and Skype in the Classroom to debate, discuss, problem solve, and connect with other classrooms. There are eight phases in the film, which takes place in Africa, set in some of the wettest, driest, hottest and coldest environments the world has to offer – the teaching aids cover all of this not only put the onus on the students think more deeply about the world around them but also teach them the value of working collaboratively.”

BBC Earth Films’ 3D spectacular, Enchanted Kingdom will introduce ‘project based learning’ into the classroom
January 21, 2015


Neil Nightingale, Director of Enchanted Kingdom & Creative Director of BBC Earth adds: “When we set out to produce Enchanted Kingdom, our vision was to create the most enchanting nature film ever made and we wanted it to change the way that our audience sees the world. Partnering with Microsoft enables us to take this vision of the film one step further and encourage children to think differently about the world around them and challenge themselves to discover more and problem solve.”

There will be a collection of Enchanted Kingdom lessons on Skype in the Classroom
January 21, 2015


Microsoft is also enabling teachers to connect, collaborate and share Enchanted Kingdom projects on the Microsoft Educator Network. This will host a community of educators all looking to take advantage of new approaches to teaching and learning, using technology to help students develop more relevant skills for the 21st century. Many of the Enchanted Kingdom projects also feature apps from the Windows Store, which can be used to view film images, videos and reference materials. There will also be a collection of Enchanted Kingdom lessons on Skype in the Classroom where educators can post their own Enchanted Kingdom-based learning sessions to connect and collaborate with other schools across the UK and internationally. They’ll also be able to find BBC film makers to join their classrooms as guest speakers through Skype. Microsoft and BBC Earth will host additional supporting content for teachers and schools such as live Q&As with the film makers.

To read more about Enchanted Kingdom please follow this link

Full View / NID: 52424 / Submitted by: The Zilla of Zuron

01.21.2015 - MS15-006 - Important: Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365) - Version: 1.1



View Microsoft related news. Severity Rating: Important
Revision Note: V1.1 (January 21, 2015): Bulletin revised to correct Server Core installation entries in the Affected Software and Severity Ratings tables. This is an informational change only. Customers who have already successfully installed the update do not have to take any action.
Summary: This security update resolves a privately reported vulnerability in Windows Error Reporting (WER). The vulnerability could allow security feature bypass if successfully exploited by an attacker. An attacker who successfully exploited this vulnerability could gain access to the memory of a running process. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 52410 / Submitted by: The Zilla of Zuron

01.13.2015 - Teachers: how ready are you for the computing revolution?



View Microsoft-Press related news.

As primary schools reopen their doors to begin the second term of teaching the new computing curriculum, a survey conducted by Microsoft and CAS has confirmed that 69% of teachers enjoy teaching the subject, which is now compulsory for all pupils from the age of five. However, the results also reveal that there is still some way to go before teachers feel fully confident about delivering computing lessons to classes of tech-savvy youngsters, as 81% have called for more training, development and learning materials.

Today, QuickStart Computing, a new set of resources developed by CAS and jointly funded by Microsoft and the Department for Education become available for the first time. The materials are designed to help teachers get the most of the curriculum, and can be downloaded at www.quickstartcomputing.org. Resources include videos, interactive tools and a teacher’s handbook.

The demand for these resources has been underpinned by data collected from the survey, which investigates pupil and teacher attitudes towards computing in the classroom. The results, released today, also reveal that two thirds of primary and secondary teachers are concerned that their pupils still have a better understanding of computing than they do, and many teachers lack the confidence that they need to deliver the new curriculum. The issue becomes even more clear when combined with results from a second survey, which showed that nearly half (47%) of young people aged 9-16 years claim that their teachers needed more training and 41% admitted to regularly helping their teachers use technology.

The new QuickStart Computing materials
January 20, 2015

The changes made to the curriculum in September 2014 are good news for the UK’s technology industry, and hold the key to helping develop a strong pipeline of talent to fill the growing number of jobs which require knowledge of computer science and coding. The UKCES predicts (Careers of the Future, Nov 2014) there will be 146,000 job openings in IT between 2012 and 2022, with jobs commanding an average salary of £38K. By supporting the development of these new resources, Microsoft hopes to be able to help teachers get more out of the new curriculum, in turn opening the eyes of more young people to the exciting career possibilities available to them.

Microsoft’s UK CEO, Michel Van der Bel remarks: “There is a moment of magic when you see a young person make something totally unique happen on a screen. Something they had imagined and then made real through code. But to get to that moment we need passionate people who have the right skills and knowledge to help give young people the building blocks they need.”

Microsoft provided well over £300,000 for the QuickStart Computing initiative in order to support teachers in creating modern, exciting and engaging lessons that will inspire a new generation of digital stars.

We should be very proud of our teachers, who are engaging so positively with the new computing, and are now inspiring and exciting children about computing in schools up and down the country,” said Simon Peyton Jones, Chairman of CAS. “CAS believes in the value of high quality, continuous professional development for teachers, and the role of working groups like CAS in instilling confidence and sharing ideas and best practice. We are delighted that from today we can share QuickStart Computing with all schools and teachers that need it.”

The QuickStart Computing materials are available for free and we urge teachers to visit the QuickStart Computing website today to see how they can start getting even more out of the new curriculum.

Full View / NID: 52398 / Submitted by: The Zilla of Zuron

01.13.2015 - MS14-080 - Critical: Cumulative Security Update for Internet Explorer (3008923) - Version: 2.0



View Microsoft related news. Severity Rating: Critical
Revision Note: V2.0 (January 13, 2015): To address issues with Security Update 3008923, Microsoft re-released MS14-080 to comprehensively address CVE-2014-6363. In addition to installing update 3008923, customers running Internet Explorer 10 on Windows 8, Windows Server 2012, or Window RT should also install update 3029449, which has been added with this rerelease. Customers who have already successfully installed the 3008923 update, which has not changed since its original release, do not need to reinstall it. See Microsoft Knowledge Base Article 3008923 for more information.
Summary: This security update resolves fourteen privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Full View / NID: 52327 / Submitted by: The Zilla of Zuron

01.13.2015 - MS15-006 - Important: Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Windows Error Reporting (WER). The vulnerability could allow security feature bypass if successfully exploited by an attacker. An attacker who successfully exploited this vulnerability could gain access to the memory of a running process. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 52321 / Submitted by: The Zilla of Zuron

01.13.2015 - MS15-004 - Important: Vulnerability in Windows Components Could Allow Elevation of Privilege (3025421) - Version: 1.0



View Microsoft related news. Severity Rating: Important
Revision Note: V1.0 (January 13, 2015): V1.0 (January 13, 2015): Bulletin published.
Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker convinces a user to run a specially crafted application. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Full View / NID: 52311 / Submitted by: The Zilla of Zuron
  Most Viewed  
  Quick Links  
  Top Affiliates  
.......