<img alt="dcsimg" id="dcsimg" width="1" height="1" src="//www.qsstats.com/dcsuuvfw300000gkyg9tnx0uc_3f7v/njs.gif?dcsuri=/index.php/c/a/Past-News/Unofficial-Registry-Script-Blunts-MS-Word-ZeroDay-Attack&amp;WT.js=No&amp;WT.tv=10.4.1&amp;dcssip=www.cioinsight.com&amp;WT.qs_dlk=XGzTr-tNM5SeRgZR6fawsgAAABA&amp;">
 

Unofficial Registry Script Blunts MS Word Zero-Day Attack

By Ryan Naraine  |  Posted 05-22-2006 Print
Internet security experts recommend that Windows users implement software restriction policies to reduce the effects of ongoing zero-day attacks against a code execution flaw in Microsoft Word.

In the absence of a patch for a dangerous code execution hole in Microsoft Word, security experts are recommending that Windows users implement software restriction policies to blunt the effects of ongoing zero-day attacks.



 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.