Microsoft & Adobe Are Planning Security Update

Microsoft has issued a Security Bulletin Advance Notification indicating that its June release will contain 16 bulletins. Nine of the bulletins will have the severity rating of critical. The notification states that these critical bulletins are for Microsoft Windows, Microsoft .NET framework, Microsoft Silverlight, Microsoft Forefront Threat Management Gateway, and Internet Explorer.

The remaining 7 bulletins will have the severity rating of important.  The notification states that these important bulletins are for Microsoft Windows, Microsoft Office, Microsoft SQL Server, and Microsoft Visual Studio. Release of these bulletins is scheduled for Tuesday, June 14, 2011.

Adobe also is planning to release updates for Adobe Reader X (10.0.1) and earlier versions for Windows, Adobe Reader X (10.0.3) and earlier versions for Macintosh, and Adobe Acrobat X (10.0.3) and earlier versions for Windows and Macintosh to resolve critical security issues. Adobe expects to make these updates available on Tuesday, June 14, 2011.

Most security breaches are the result of a software or hardware vulnerability caused by a missing patch. In fact, in 2010 Microsoft issued a record number of 106 security bulletins patching a total of 266 vulnerabilities. So if organization unaware of the latest updates, holes would be left unpatched on the network – these being excellent targets for malware.

All Microsoft security update can be downloaded and installed via the Windows Update and Microsoft Update services, as well as through Windows Server Update Services.

make sure you subscribe to my RSS feed!

Share
  • Pingback: Sameh

  • Pingback: SecureTechnology

  • Pingback: Aladin

  • Pingback: Aladin

  • Pingback: Aladin

  • Pingback: Aladin

  • Pingback: Aladin

  • Pingback: TOM

  • Pingback: TOM

  • Pingback: TOM

  • Pingback: TOM

  • Pingback: TOM

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: John Taylor

  • Pingback: Mourad ben lakhoua

  • Pingback: Mourad ben lakhoua

  • Pingback: Mourad ben lakhoua

  • Pingback: Mourad ben lakhoua

  • Pingback: Mourad ben lakhoua

  • Pingback: Mourad Ben Lakhoua

  • Pingback: Mourad Ben Lakhoua

  • Pingback: Mourad Ben Lakhoua

  • Pingback: Mourad Ben Lakhoua

  • Pingback: Mourad Ben Lakhoua

  • Pingback: ArabSec

  • Pingback: Wiredsec

  • Pingback: Wiredsec

  • Pingback: Wiredsec

  • Pingback: Wiredsec

  • Pingback: Wiredsec

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: BugHunter

  • Pingback: Cyber Informer

  • Pingback: Win Security