Yep, I saw that, but the initial reading almost felt like "the complaint we are investigating is about IE7-9" :)
* * *ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of Technology for the SMB market… * On Tue, Sep 18, 2012 at 9:39 AM, Rod Trent <rodtr...@myitforum.com> wrote: > Listed in the “non-affected” list…**** > > **** > > ** ** > > ** ** > > *Rod Trent <http://myitforum.com/myitforumwp/community/members/rodtrent/>* > > [image: Description: myITSMButton] <http://www.myitforum.com/>[image: > Description: TwitterButton] <http://twitter.com/rodtrent>[image: > Description: Facebookbutton] <http://www.facebook.com/rodtrent>[image: > Description: LinkedInButton]<http://www.linkedin.com/profile/view?id=2881785> > **** > > ** ** > > *From:* Andrew S. Baker [mailto:asbz...@gmail.com] > *Sent:* Tuesday, September 18, 2012 9:23 AM > > *To:* NT System Admin Issues > *Subject:* Re: Hackers exploit new IE zero-day vulnerability - MS response > **** > > ** ** > > Lots of default mitigations.**** > > ** ** > > I wonder if they've actually testing IE10... Their response is somewhat > ambiguous on that point. > **** > > *ASB***** > > *http://XeeMe.com/AndrewBaker***** > > *Harnessing the Advantages of Technology for the SMB market…***** > > > > **** > > On Tue, Sep 18, 2012 at 9:08 AM, David Lum <david....@nwea.org> wrote:**** > > MS’s response: > http://technet.microsoft.com/en-us/security/advisory/2757760**** > > **** > > **** > > *From:* Sam Cayze [mailto:sca...@gmail.com] > *Sent:* Monday, September 17, 2012 4:29 PM > *To:* NT System Admin Issues > *Subject:* RE: Hackers exploit new IE zero-day vulnerability - > Computerworld**** > > **** > > Looks like a good night to get around to installing EMET for us.**** > > **** > > *From:* Ziots, Edward [mailto:ezi...@lifespan.org] > *Sent:* Monday, September 17, 2012 2:21 PM > *To:* NT System Admin Issues > *Subject:* RE: Hackers exploit new IE zero-day vulnerability - > Computerworld**** > > **** > > IE 7-9 are vulnerable.. I wonder if this is why I see such an uptick in > Zero-Access lately. **** > > **** > > Z**** > > **** > > Edward E. Ziots, CISSP, Security +, Network +**** > > Security Engineer**** > > Lifespan Organization**** > > ezi...@lifespan.org**** > > **** > > *From:* Sam Cayze [mailto:sca...@gmail.com] > *Sent:* Monday, September 17, 2012 3:13 PM > *To:* NT System Admin Issues > *Subject:* Hackers exploit new IE zero-day vulnerability - Computerworld** > ** > > **** > > **** > > > http://www.computerworld.com/s/article/9231367/Hackers_exploit_new_IE_zero_day_vulnerability?source=rss_latest_content&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+computerworld%2Fnews%2Ffeed+%28Latest+from+Computerworld%29 > **** > > > ** > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to listmana...@lyris.sunbeltsoftware.com with the body: unsubscribe ntsysadmin
<<image001.jpg>>
<<image003.png>>
<<image002.png>>
<<image004.png>>
<<image005.png>>