Skip to Content

Microsoft fixes critical security flaws in Windows

Microsoft Corp. released four critical patches Tuesday to plug security holes in several versions of its Windows operating system, Internet Explorer Web browser and other programs.

The patches, which carried Microsoft’s highest security warning, all are to prevent malicious hackers from remotely taking control of computers without permission.

Three of the patches aim to protect Windows users who unwittingly expose their computers to attack by visiting Web pages infected with malicious code, or look at similarly tainted e-mails with Outlook Express or Windows Mail. A fourth patch prevents hackers from gaining remote access to PCs by installing a specially crafted program.

Two of these critical updates fix holes in the company’s newest operating system, Windows Vista, which Microsoft has touted as the most secure ever.

Vista went on sale to consumers at the end of January; in April, Microsoft broke its once-monthly update schedule with an emergency fix after the company and security experts found hackers were exploiting a hole in the way Vista and other versions of Windows handle animated cursor files.

Microsoft also Tuesday released a patch for its Visio diagram drawing program and a patch for a vulnerability in Windows that could allow unauthorized users to break into computers to steal passwords and other user information.

Additionally, Microsoft released seven non-security, high-priority updates Tuesday, including a monthly update to a tool that removes harmful software from PCs.

On the second Tuesday of each month, the Redmond, Wash.-based software maker releases security updates. Windows users can download patches from Microsoft’s Web site or get them through an automatic update system.

Spammers are taking advantage of ”Patch Tuesday” to send e-mails that appear to come from Microsoft, but that actually install programs that let hackers gain future access to infected PCs. Fred Touchette, a security analyst for the spam and virus filtering company AppRiver LLC, said he has seen this particular tactic twice before, most recently in 2004. The current attack, which started late last week, is ”pretty small,” he said.

Keep Reading

Most Popular

Large language models can do jaw-dropping things. But nobody knows exactly why.

And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.

OpenAI teases an amazing new generative video model called Sora

The firm is sharing Sora with a small group of safety testers but the rest of us will have to wait to learn more.

Google’s Gemini is now in everything. Here’s how you can try it out.

Gmail, Docs, and more will now come with Gemini baked in. But Europeans will have to wait before they can download the app.

This baby with a head camera helped teach an AI how kids learn language

A neural network trained on the experiences of a single young child managed to learn one of the core components of language: how to match words to the objects they represent.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.