The Latest in IT Security

Posts Tagged ‘word document’

We discussed much of the unfolding Duqu attack in our previous post. Some new light has recently illuminated some missing pieces to this interesting attack. Researchers at CrySys Labs in Hungary have disclosed information about a Word document that is purported to be the installer file for the Duqu attacks. The document loads a kernel […]

Read more ...

Microsoft has released 5 security bulletins covering a total of 15 vulnerabilities. All of these vulnerabilities are rated Important by Microsoft, even though three of them could lead to remote code execution. The patches address elevation of privileged and remote code execution vulnerabilities and may require a restart of Windows. Two of the bulletins address […]

Read more ...

The application's digital signature cannot be verified. Do you want to run the application? By: Rodrigo Calvo, CISSP       Sebastian Brenner, CISSP Infostealer.Bancos is a detection name used by Symantec to identify particular malicious software programs that gather confidential financial information from compromised computers. It first appeared in the summer of 2003 and targeted mainly […]

Read more ...


Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments