The Latest in IT Security

Posts Tagged ‘macros’

For employees facing hundreds of e-mails, the temptation to speed-read and download attachments on autopilot can be great. Cybercriminals, of course, take advantage, sending out seemingly important documents that might contain just about anything from phishing links to malware. Our experts recently discovered two very similar spam campaigns distributing the IcedID and Qbot banking Trojans. […]

Read more ...

Enterprise system administrators can now block attackers from using a favorite malware infection method: Microsoft Office documents with malicious macros. Microsoft this week added a new option in Office 2016 that allows administrators to block macros — embedded automation scripts — from running in Word, Excel and PowerPoint documents that originate from the Internet. Microsoft […]

Read more ...

The first spring month in 2012 was unusually “hot” with the emergence of a whole series of new threats to Windows and other platforms. In particular, attackers came up with another way to spread Trojans for Mac OS X, and new malicious applications for Android were discovered. In early March, immediately following the Russian presidential […]

Read more ...


Categories

TUESDAY, APRIL 23, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments