The Latest in IT Security

Posts Tagged ‘microsoft office’

Spammers have done a very good job a hijacking web searches related to buying software online. More than 90% of search results for “buy Microsoft Windows” and similar searches, lead to fake stores on major search engines. Not much has been done by the search engines to clean up these search results. Since the beginning […]

Read more ...

A new vulnerability in Windows, CVE -2011-3402, has been recently identified and is already exploited in the wild. For now, only a handful of targeted attacks have been found. The vulnerability exists in Windows TrueType Font Parsing Engine and affects most Windows versions, including Windows 7. An attack involves a file which has a maliciously […]

Read more ...

At last week’s Virus Bulletin 2011 conference Paul Baccas and Stephen Edwards from SophosLabs presented their research paper “Fast fingerprinting of OLE2 files: Heuristics for detection of exploited OLE2 files based on specification non-conformance”. They may win the prize for the longest title, but what does it mean? OLE2 is a container format synonymous with […]

Read more ...


Categories

FRIDAY, MAY 16, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments