The Latest in IT Security

Posts Tagged ‘word documents’

[Thanks to Takayoshi Nakayama for his research and contributions to this blog.] Targeted attacks have been a pretty popular topic of discussion in the security industry in recent years. Many may recall the incident involving Hydraq—from January 2010—and Shady RAT was something discussed more recently. Most targeted attacks involve emails with malware attachments as the […]

Read more ...

McAfee published an interesting report yesterday about what they called Operation Shady RAT, focusing on a series of what some may call “advance persistent threat” attacks. The attacks were dubbed in some quarters as “one of the largest series of cyber attacks ever.” While quite a bit of data was presented regarding the potential scale […]

Read more ...

Apple released an update for iWork 9.0 through 9.0.5 which fixes three vulnerabilities which could potentially be used to perform malicious actions. The new version, 9.1, fixes a buffer overflow which could lead to unexpected program termination and also arbitrary code execution and a memory corruption in handling Excel and Word documents which if used […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments