Feeds

MS ships Love Bug patch – do you feel lucky?

Doesn't break your systems after all. So it's your fault when virus hell ensues...

  • alert
  • submit to reddit

New hybrid storage solutions

Microsoft finally shipped the Outlook 'Love Bug' patch today, and from the sound of it the delay in getting it out has allowed time for a climb down from the original 'take them out and shoot them' approach.

Rather than blocking everything that looked even slightly like it was packing iron - as originally planned, in a knee-jerk sort of way - the patch now incorporates some flexibility. Think of it like this: there's a knock on your door, it might be the milkman, the guy next door you didn't like anyway, or an axe murderer. With the spec as previously advertised, the door wouldn't open. Now you have the choice to decide whether to open the door, or blow the mother away.

And Microsoft isn't liable, because you've been warned. But hey, that's just our take on it. According to the release, the Outlook email security update "provides a significantly improved level of security for Outlook users by blocking access to potentially unsafe file types that virus writers target and use to transmit viruses as email attachments."

Those file types are of course Microsoft file types, but that doesn't mean the file types themselves are unsafe. No way - it's just because they're such popular file types. Microsoft "strongly recommends" that all Outlook users download the security update, and this covers Microsoft. But given that the original spec update would have broken lots of legitimate systems written to take advantage of the features of Outlook which it would have, er, disabled, the update "now allows organisations to customise the new security features for the functionality they require without sacrificing security."

We're not entirely sure about the veracity of that last bit, but we'd read the bottom line as being that if you've got mission-critical systems dependent on executable files running via Outlook, you can still run them, but it's not Microsoft's fault if some punk uses this as a loophole to trash your entire network.

You can get the patch here. We know where you can get Eudora too, but we're being nice. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.