The Latest in IT Security

Posts Tagged ‘file formats’

Since last week, we have seen many specially crafted files exploiting CVE-2012-0158, a vulnerability in MSCOMCTL.OCX in Microsoft Office and some other Microsoft products. This exploit can be implemented in a variety of file formats, including RTF, Word, and Excel files. We have already found crafted RTF and Word files in the wild. In the […]

Read more ...

17
Apr
2012

Engine Developer Posted: 17 April 2012 Company name: Norman Data Defense Systems, Inc. Location: Oslo, Norway/San Diego, USA United States Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:Norman is looking for experienced software developers. The ideal candidate has a strong interest in malware detection, emulators and/or reverse engineering. If […]

Read more ...

Sr. Anti Malware Researcher Posted: 5 March 2012 Company name: McAfee Location: Beaverton United States Pay rate: Market – Fulltime Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:Senior Anti-Malware Researcher McAfee believes that amazing things can be accomplished by diverse teams of talented individuals. Share your talents with us […]

Read more ...


Categories

FRIDAY, MAY 03, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments