News

Ben Greenbaum, senior research manager of Symantec Security Response, said that the vulnerability could be a stack overflow in the Microsoft Jet Database engine, which handles .mdb files.
Microsoft has cautioned customers using legacy versions of Access, warning them that they'll receive no support after October 14.
A few best practices can go a long way toward protecting your Access data from careless or overly curious users. Here are some simple ways to add a few layers of security to a database.
According to a US-CERT alert, the attacks are using an unpatched stack buffer overflow vulnerability in the way Microsoft Access handles specially crafted database files.
Five questions to ask to stay aheadAs cyber threats escalate and compliance demands intensify, CIOs and CTOs must reassess their approach to database security, says Colin Baumgart, Global Sales ...
Microsoft Access allows business and other large, data-sharing entities to create databases storing vast amounts of information. Anyone using Access can share these database files with one another.
The Database Admin's Security Burden Security is everyone's job, but in a time when data is king, SQL Server admins play a more critical role than ever in their organizations' security postures.
Microsoft Access is an invaluable tool for many small businesses. Often, an Access database file contains confidential information necessitating password security.