{"id":287,"date":"2006-01-12T04:00:19","date_gmt":"2006-01-11T21:00:19","guid":{"rendered":"http:\/\/ebarrelracing.com\/articles\/?p=287"},"modified":"2006-01-12T04:00:19","modified_gmt":"2006-01-11T21:00:19","slug":"microsoft-to-hunt-new-species-of-bugs-siliconcom","status":"publish","type":"post","link":"https:\/\/www.ebarrelracing.com\/articles\/computer\/microsoft-to-hunt-new-species-of-bugs-siliconcom\/","title":{"rendered":"Microsoft to hunt &#8216;new species&#8217; of bugs &#8211; silicon.com"},"content":{"rendered":"<p><a href=\"http:\/\/software.silicon.com\/security\/0,39024655,39155485,00.htm\">Microsoft to hunt &#8216;new species&#8217; of bugs &#8211; Security Strategy &#8211; Breaking Business and Technology News at silicon.com<\/a><br \/>\n<em>For more info click on above link<br \/>\n<\/em><br \/>\nMicrosoft plans to scour its code to look for flaws similar to a recent serious Windows bug and to update its development practices to prevent similar problems in future products.<\/p>\n<p>The critical flaw in the way Windows Meta File (WMF) images are handled, is different to any security vulnerability the software maker has dealt with in the past, according to Kevin Kean and Debby Fry Wilson, directors in Microsoft&#8217;s Security Response Center. Typical flaws are unforeseen gaps in programs that hackers can take advantage of and run code. By contrast, the WMF problem lies in a software feature being used in an unintended way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft to hunt &#8216;new species&#8217; of bugs &#8211; Security Strategy &#8211; Breaking Business and Technology News at silicon.com For more info click on above link Microsoft plans to scour its code to look for flaws similar to a recent serious Windows bug and to update its development practices to prevent similar problems in future products. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,30,26],"tags":[],"class_list":["post-287","post","type-post","status-publish","format-standard","hentry","category-computer","category-spyware","category-viruses"],"_links":{"self":[{"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/posts\/287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":0,"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ebarrelracing.com\/articles\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}