Yep, I saw that, but the initial reading almost felt like "the complaint we
are investigating is about IE7-9"  :)

* *

*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Tue, Sep 18, 2012 at 9:39 AM, Rod Trent <rodtr...@myitforum.com> wrote:

> Listed in the “non-affected” list…****
>
> ****
>
> ** **
>
> ** **
>
> *Rod Trent <http://myitforum.com/myitforumwp/community/members/rodtrent/>*
>
> [image: Description: myITSMButton] <http://www.myitforum.com/>[image:
> Description: TwitterButton] <http://twitter.com/rodtrent>[image:
> Description: Facebookbutton] <http://www.facebook.com/rodtrent>[image:
> Description: LinkedInButton]<http://www.linkedin.com/profile/view?id=2881785>
> ****
>
> ** **
>
> *From:* Andrew S. Baker [mailto:asbz...@gmail.com]
> *Sent:* Tuesday, September 18, 2012 9:23 AM
>
> *To:* NT System Admin Issues
> *Subject:* Re: Hackers exploit new IE zero-day vulnerability - MS response
> ****
>
> ** **
>
> Lots of default mitigations.****
>
> ** **
>
> I wonder if they've actually testing IE10...  Their response is somewhat
> ambiguous on that point.
> ****
>
> *ASB*****
>
> *http://XeeMe.com/AndrewBaker*****
>
> *Harnessing the Advantages of Technology for the SMB market…*****
>
>
>
> ****
>
> On Tue, Sep 18, 2012 at 9:08 AM, David Lum <david....@nwea.org> wrote:****
>
> MS’s response:
> http://technet.microsoft.com/en-us/security/advisory/2757760****
>
>  ****
>
>  ****
>
> *From:* Sam Cayze [mailto:sca...@gmail.com]
> *Sent:* Monday, September 17, 2012 4:29 PM
> *To:* NT System Admin Issues
> *Subject:* RE: Hackers exploit new IE zero-day vulnerability -
> Computerworld****
>
>  ****
>
> Looks like a good night to get around to installing EMET for us.****
>
>  ****
>
> *From:* Ziots, Edward [mailto:ezi...@lifespan.org]
> *Sent:* Monday, September 17, 2012 2:21 PM
> *To:* NT System Admin Issues
> *Subject:* RE: Hackers exploit new IE zero-day vulnerability -
> Computerworld****
>
>  ****
>
> IE 7-9 are vulnerable.. I wonder if this is why I see such an uptick in
> Zero-Access lately. ****
>
>  ****
>
> Z****
>
>  ****
>
> Edward E. Ziots, CISSP, Security +, Network +****
>
> Security Engineer****
>
> Lifespan Organization****
>
> ezi...@lifespan.org****
>
>  ****
>
> *From:* Sam Cayze [mailto:sca...@gmail.com]
> *Sent:* Monday, September 17, 2012 3:13 PM
> *To:* NT System Admin Issues
> *Subject:* Hackers exploit new IE zero-day vulnerability - Computerworld**
> **
>
>  ****
>
>  ****
>
>
> http://www.computerworld.com/s/article/9231367/Hackers_exploit_new_IE_zero_day_vulnerability?source=rss_latest_content&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+computerworld%2Fnews%2Ffeed+%28Latest+from+Computerworld%29
> ****
>
>
> **
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

<<image001.jpg>>

<<image003.png>>

<<image002.png>>

<<image004.png>>

<<image005.png>>

Reply via email to