SlideShare a Scribd company logo
1 of 3
Download to read offline
Windows Live Hotmail Print Message                                                                       Page 1 of 3




 Increase the security of your organisation by getting the facts on the global
 threat landscape!
 From: Microsoft Malaysia (microsoft@e-mail.microsoft.com)
 Sent: 08 April 2010 08:19:13
 To: ultradynamic_azizshah@hotmail.com




        Welcome back to the Microsoft Security Intelligence Report Series - Part 2. In this edition,
        we are focusing on software vulnerability exploits.

        An exploit is malicious code that takes advantage of software vulnerabilities to infect a
        computer without the user's consent and often without the user's knowledge. Exploits are
        often distributed through Web pages, although attackers also use a number of other
        distribution methods, such as e-mail and instant messaging (IM) services.

                                                                                                                

        Here is a quick look at what happened around the world in 1H09:
                                                                                                                
                                                                                    On Windows XP-based
        Software Vulnerability Exploit Details                                  
                                                                                    machines, Microsoft
        Browser-based exploits by operating system and                              vulnerabilities account
        software vendor                                                             for 56.4% of the
                                                                                    exploits, but on
        Browser-based exploits targeting   Browser-based exploits targeting         Windows Vista-based
        Microsoft and third-party          Microsoft and third-party software
                                                                                    machines, Microsoft
        software on computers running      on computers running Windows
                                                                                    vulnerabilities account
        Windows XP in 1H09                 Vista in 1H09
                                                                                    for only 15.5% of the
                                                                                    exploits. Windows 7 is
                                                                                    built on the same
                                                                                    security foundation as
                                                                                    Windows Vista and
                                                                                    promises the same        
                                                                                    great protection – with
                                                                                    better device
                                                                                    compatibility and user-
                                                                                    friendly functionality
                                                                                    built in.
        Document File Format Attacks
        Microsoft Office Format Exploits                                           Increasingly, attackers
                                                                                    are using common file
                                                                                    formats, like .doc, .xls
           Vulnerabilities exploited in Microsoft Office file formats
                                                                                    and .ppt as
                                                                                    transmission vectors for
                                                                                    exploits. These formats
                                                                                    are used legitimately by




http://by140w.bay140.mail.live.com/mail/PrintShell.aspx?type=message&cpids=b3a09da... 10/04/2010
Windows Live Hotmail Print Message                                                                   Page 2 of 3



                                                                            many people, so
                                                                            blocking them is not
                                                                            practical and as a result
                                                                            has made them an
                                                                            attractive target for
                                                                            exploitation.




                                                                                                         
        This is one of the many reasons that make it so important for customers to apply all
        Security Updates and have an automated process for deployment. Customers running
        Windows Server 2003, 2008 and R2 are entitled to use Windows Server Update Services 
        as part of their licensing agreement. This technology will enable customers to automate
        the process of Security Update deployment.

                                                                                                         

        What we at Microsoft have learnt is that the features and updates available with different
        versions of the Windows Operating System – along with the differences in the way people
        and organisations use each version – affect the infection rates seen.

        Infection Trends
        Operating system trends



                                          Number of computers cleaned for every 1,000
                                          MSRT executions, by operating system, 1H09




                                                                                                         




        This figure shows that computers with more recent service packs installed have significantly
        lower infection rates than computers with older service packs (or the RTM release) for the
        same platform. This trend can be observed consistently across client and server operating
        systems.

        Staying up-to-date is imperative, and for that reason we would like to remind customers




http://by140w.bay140.mail.live.com/mail/PrintShell.aspx?type=message&cpids=b3a09da... 10/04/2010
Windows Live Hotmail Print Message                                                                   Page 3 of 3



           running Windows® XP Service Pack 2 (SP2), Windows® 2000 Server and Windows® 2000
           Professional that they will all reach their End of Support (EOS) milestone on July 13, 2010,
           and the original "RTM" version of Windows Vista® will reach EOS on April 13, 2010.

           As a result, customers who use these versions of Microsoft software will stop receiving
           regular Security Updates from those dates and may be exposed to security exploits. We
           encourage customers to understand the impact of this and take the necessary steps to
           avoid any issues when the support is terminated.

                                                                                                           

           To read more about this report, log on to our site. And do remember to look out for Part 3
           of our Security Series, where we will be looking at malware, email threats and phishing.
                                                                                                       
   
      Unsubscribe | Update your profile
      © 2010 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement                               




http://by140w.bay140.mail.live.com/mail/PrintShell.aspx?type=message&cpids=b3a09da... 10/04/2010

More Related Content

Viewers also liked

carro rojo y uso de desfibrilador
carro rojo y uso de desfibriladorcarro rojo y uso de desfibrilador
carro rojo y uso de desfibriladorMare Reyes Martinez
 
Presentation Bean & Co. espresso
Presentation Bean & Co. espressoPresentation Bean & Co. espresso
Presentation Bean & Co. espressoBert Stoker
 
Orientak
OrientakOrientak
Orientakrevoke
 
Presentation Bean & Co. espresso
Presentation Bean & Co. espressoPresentation Bean & Co. espresso
Presentation Bean & Co. espressoBert Stoker
 
The 8 Credos of Challenger Brands
The 8 Credos of Challenger BrandsThe 8 Credos of Challenger Brands
The 8 Credos of Challenger Brandseatbigfish
 
eatbigfish workshops 2013
eatbigfish workshops 2013eatbigfish workshops 2013
eatbigfish workshops 2013eatbigfish
 
Eatbigfish speeches 2013
Eatbigfish speeches 2013Eatbigfish speeches 2013
Eatbigfish speeches 2013eatbigfish
 
eatbigfish - an overview of our offer 2013
eatbigfish  - an overview of our offer 2013eatbigfish  - an overview of our offer 2013
eatbigfish - an overview of our offer 2013eatbigfish
 
E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...
E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...
E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...Maria Cristina Bassi
 

Viewers also liked (12)

Sobreviviendo a la sepsis
Sobreviviendo a la sepsis Sobreviviendo a la sepsis
Sobreviviendo a la sepsis
 
carro rojo y uso de desfibrilador
carro rojo y uso de desfibriladorcarro rojo y uso de desfibrilador
carro rojo y uso de desfibrilador
 
sandra
sandrasandra
sandra
 
Presentation Bean & Co. espresso
Presentation Bean & Co. espressoPresentation Bean & Co. espresso
Presentation Bean & Co. espresso
 
Voda
VodaVoda
Voda
 
Orientak
OrientakOrientak
Orientak
 
Presentation Bean & Co. espresso
Presentation Bean & Co. espressoPresentation Bean & Co. espresso
Presentation Bean & Co. espresso
 
The 8 Credos of Challenger Brands
The 8 Credos of Challenger BrandsThe 8 Credos of Challenger Brands
The 8 Credos of Challenger Brands
 
eatbigfish workshops 2013
eatbigfish workshops 2013eatbigfish workshops 2013
eatbigfish workshops 2013
 
Eatbigfish speeches 2013
Eatbigfish speeches 2013Eatbigfish speeches 2013
Eatbigfish speeches 2013
 
eatbigfish - an overview of our offer 2013
eatbigfish  - an overview of our offer 2013eatbigfish  - an overview of our offer 2013
eatbigfish - an overview of our offer 2013
 
E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...
E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...
E-LIS, un archivio ad accesso aperto per biblioteconomia e scienze dell'infor...
 

Similar to Microsoft Update Security Support

Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a FlashTrend Micro
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The EnterpriseAyed Al Qartah
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
IRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET Journal
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Private Cloud
 
Moxa Tech White Paper - Choosing An Embedded Operating System
Moxa Tech White Paper - Choosing An Embedded Operating SystemMoxa Tech White Paper - Choosing An Embedded Operating System
Moxa Tech White Paper - Choosing An Embedded Operating SystemDigital River
 
Osdc presentation (15 cs175)
Osdc presentation (15 cs175)Osdc presentation (15 cs175)
Osdc presentation (15 cs175)Mahnoor Masroor
 
Computer Virus
Computer Virus Computer Virus
Computer Virus bebo
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...IJNSA Journal
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Alexander Benoit
 
Operating Systems ( Os )
Operating Systems ( Os )Operating Systems ( Os )
Operating Systems ( Os )Amber Wheeler
 

Similar to Microsoft Update Security Support (20)

Windows7sins
Windows7sinsWindows7sins
Windows7sins
 
Secure client
Secure clientSecure client
Secure client
 
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a FlashWeb Threat Spotlight Issue 66:  Zero-Day Adobe Flash Player Exploits in a Flash
Web Threat Spotlight Issue 66: Zero-Day Adobe Flash Player Exploits in a Flash
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Windows7sins
Windows7sinsWindows7sins
Windows7sins
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
IRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-DriveIRJET- Implementation of Anti-Drive
IRJET- Implementation of Anti-Drive
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Microsoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server DatasheetMicrosoft Forefront - Security for Communications Server Datasheet
Microsoft Forefront - Security for Communications Server Datasheet
 
Moxa Tech White Paper - Choosing An Embedded Operating System
Moxa Tech White Paper - Choosing An Embedded Operating SystemMoxa Tech White Paper - Choosing An Embedded Operating System
Moxa Tech White Paper - Choosing An Embedded Operating System
 
Presentation
PresentationPresentation
Presentation
 
Osdc presentation (15 cs175)
Osdc presentation (15 cs175)Osdc presentation (15 cs175)
Osdc presentation (15 cs175)
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
VIRTUAL MACHINES AND NETWORKS – INSTALLATION, PERFORMANCE, STUDY, ADVANTAGES ...
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 
Operating Systems ( Os )
Operating Systems ( Os )Operating Systems ( Os )
Operating Systems ( Os )
 

Recently uploaded

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Microsoft Update Security Support

  • 1. Windows Live Hotmail Print Message Page 1 of 3 Increase the security of your organisation by getting the facts on the global threat landscape! From: Microsoft Malaysia (microsoft@e-mail.microsoft.com) Sent: 08 April 2010 08:19:13 To: ultradynamic_azizshah@hotmail.com Welcome back to the Microsoft Security Intelligence Report Series - Part 2. In this edition, we are focusing on software vulnerability exploits. An exploit is malicious code that takes advantage of software vulnerabilities to infect a computer without the user's consent and often without the user's knowledge. Exploits are often distributed through Web pages, although attackers also use a number of other distribution methods, such as e-mail and instant messaging (IM) services.   Here is a quick look at what happened around the world in 1H09:     On Windows XP-based Software Vulnerability Exploit Details  machines, Microsoft Browser-based exploits by operating system and vulnerabilities account software vendor for 56.4% of the exploits, but on Browser-based exploits targeting Browser-based exploits targeting Windows Vista-based Microsoft and third-party Microsoft and third-party software machines, Microsoft software on computers running on computers running Windows vulnerabilities account Windows XP in 1H09 Vista in 1H09 for only 15.5% of the exploits. Windows 7 is built on the same security foundation as Windows Vista and   promises the same   great protection – with better device compatibility and user- friendly functionality built in. Document File Format Attacks Microsoft Office Format Exploits  Increasingly, attackers are using common file formats, like .doc, .xls Vulnerabilities exploited in Microsoft Office file formats and .ppt as transmission vectors for exploits. These formats are used legitimately by http://by140w.bay140.mail.live.com/mail/PrintShell.aspx?type=message&cpids=b3a09da... 10/04/2010
  • 2. Windows Live Hotmail Print Message Page 2 of 3 many people, so blocking them is not practical and as a result has made them an attractive target for exploitation.     This is one of the many reasons that make it so important for customers to apply all Security Updates and have an automated process for deployment. Customers running   Windows Server 2003, 2008 and R2 are entitled to use Windows Server Update Services  as part of their licensing agreement. This technology will enable customers to automate the process of Security Update deployment.   What we at Microsoft have learnt is that the features and updates available with different versions of the Windows Operating System – along with the differences in the way people and organisations use each version – affect the infection rates seen. Infection Trends Operating system trends Number of computers cleaned for every 1,000 MSRT executions, by operating system, 1H09     This figure shows that computers with more recent service packs installed have significantly lower infection rates than computers with older service packs (or the RTM release) for the same platform. This trend can be observed consistently across client and server operating systems. Staying up-to-date is imperative, and for that reason we would like to remind customers http://by140w.bay140.mail.live.com/mail/PrintShell.aspx?type=message&cpids=b3a09da... 10/04/2010
  • 3. Windows Live Hotmail Print Message Page 3 of 3 running Windows® XP Service Pack 2 (SP2), Windows® 2000 Server and Windows® 2000 Professional that they will all reach their End of Support (EOS) milestone on July 13, 2010, and the original "RTM" version of Windows Vista® will reach EOS on April 13, 2010. As a result, customers who use these versions of Microsoft software will stop receiving regular Security Updates from those dates and may be exposed to security exploits. We encourage customers to understand the impact of this and take the necessary steps to avoid any issues when the support is terminated.   To read more about this report, log on to our site. And do remember to look out for Part 3   of our Security Series, where we will be looking at malware, email threats and phishing.     Unsubscribe | Update your profile   © 2010 Microsoft Corporation Terms of Use | Trademarks | Privacy Statement   http://by140w.bay140.mail.live.com/mail/PrintShell.aspx?type=message&cpids=b3a09da... 10/04/2010