B2B Articles - Nov 5, 2011 12:18:38 PM
Microsoft has issued a work-around for the attack against the Win32k TrueType font parsing engine, which is an advanced piece of malicious software still undergoing analysis by researchers.
As Microsoft builds a patch for the vulnerability, they have issued a temporary work-around to "blunt" attacks against the Win32k TrueType font parsing engine--Duqu attacks. This attack can be delivered by a malicious Microsoft Word document, which could easily be sent as an email attachment or distributed by a website download.
Microsoft's workarounds are a few lines of code that run at an administrative command prompt. But, by running the code, it would cause some applications that rely on embedded font technology to not run correctly or display properly.
The workarounds apply to Microsoft's XP, Vista and 7 operating systems as well as to various Windows Server products.
Tel 212-993-7809
Ironpaper ®
10 East 33rd Street
6th Floor
New York, NY 10016
Map
First-party data marketing
SEO for B2B
Customer journey strategy
ABM Agency
Marketing for IoT Companies
HubSpot Implementation
B2B Product Marketing
Measurable Marketing
IoT go-to-market strategy
IT Marketing
HubSpot for ABM
Go to market strategy
Technology Marketing
Marketing for IT Companies
ABM Campaigns
B2B lead generation
B2B Marketing and Growth Agency.
Grow your B2B business boldly. Ironpaper is a B2B marketing agency. We build growth engines for marketing and sales success. We power demand generation campaigns, ABM programs, create B2B content, strengthen sales enablement, generate qualified leads, and improve B2B marketing efforts.