The Latest in IT Security

Posts Tagged ‘risks’

Enterprise system administrators can now block attackers from using a favorite malware infection method: Microsoft Office documents with malicious macros. Microsoft this week added a new option in Office 2016 that allows administrators to block macros — embedded automation scripts — from running in Word, Excel and PowerPoint documents that originate from the Internet. Microsoft […]

Read more ...

The popular and sometimes controversial Shodan search engine made some changes recently that drew attention mostly of the latter variety. If you are not familiar with Shodan, it is the self-proclaimed “first search engine for Internet-connected devices” providing information about the connectedness of everything from refrigerators to power plants. The new capability at Shodan that […]

Read more ...

The iPhone 5c at the center of the legal battle between Apple and the FBI might be accessible through a delicate hardware technique, but experts warn it would be difficult. In recent days, the American Civil Liberties Union’s technology fellow and former NSA contractor Edward Snowden have suggested a method that would let investigators repeatedly […]

Read more ...


Categories

MONDAY, MARCH 17, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments