The exploit's quick appearance suggests IT professionals need to patch, and patch quickly.
Microsoft is putting up $250,000 for information leading to the arrest of the Conficker worm's author.
Microsoft issued its monthly security patch, addressing four critical fixes and two important ones.
Microsoft expects to fix Internet Explorer, SQL Server and Visio in its upcoming February security patch.
Execs said that two security changes will be implemented in the Release Candidate version of the OS.
The UNIX-like server solution adds some extra security features beyond what you'd find with typical Linux OSes.
Though Microsoft may have gotten ahead of the browser-security curve with RC1 of IE 8, which includes a feature that helps protect against clickjacking attacks, recent developments suggest that other browsers haven't quite caught up yet.
Microsoft has advanced to the next testing phase by issuing Release Candidate "Escrow"-build versions of Service Pack 2.
The jobs portal company reported that personal information was stolen from its customer database.
Microsoft is giving the general public more time to get and test its latest operating system.
Redmond's security team is undergoing a revamp with the announcement that Andrew Cushman, director of Microsoft's Security Response Center, will be stepping down to be replaced by group manager Mike Reavey.
Redmond tells security group how to disable AutoRun in Windows.
Microsoft advises applying a patch issued in October.
Microsoft's January security update contains one patch to stave off potential remote code execution attacks.
A government-led coalition identified common errors in software development with an eye toward improving security.
A public beta of Microsoft's latest Windows Server solution was released this month.
Microsoft's first security update rollout of 2009 may be a quiet one, according to an advance notification released Thursday.
A pair of researchers are claiming to have sussed out how to circumnavigate the security protections in Intel's vPro remote management technology.
Organizations need a commitment to security and better implementation of security tools, experts say.
Weaknesses found in the MD5 hash algorithm could be used as a basis to generate fraudulent X.509 Certification Authority certificates.