The Latest in IT Security

Posts Tagged ‘word document’

An advanced cyber-espionage network targeting high-profile organizations and governments has recently been unveiled. The main attack method being used in this campaign is spear phishing.The spear phishing emails contain Word document or Excel spreadsheet attachments that exploit three known vulnerabilities in order to compromise computers. The vulnerabilities used are: Microsoft Excel ‘FEATHEADER’ Record Remote Code […]

Read more ...

Looks like some scammers had a bit of a mix-up while counting out their cash on a gold plated yacht. Click to Enlarge Here’s the contents of the mail. The text in bold is a not-very-subtle clue: “The UPS Office“: Order: SD-5468-482485468 Order Date: Monday, 2 December 2012, 11:23 AM Dear Customer, Your parcel has […]

Read more ...

As we are all aware, Adobe released security updates for Adobe Flash Player 11.3.300.270 and earlier versions for Windows, Macintosh, and Linux. These security updates address the Adobe Flash Player CVE-2012-1535 Remote Code Execution Vulnerability that could cause the application to crash and potentially allow an attacker to take control of the compromised computer. Adobe […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments