McAfee Labs Detects Zero-Day Exploit Targeting Microsoft Office
Last Thursday morning (October 31), our Advanced Exploit Detection System (AEDS), which we discussed in an earlier post, detected a suspicious sample targeting Microsoft Office. After
Last Thursday morning (October 31), our Advanced Exploit Detection System (AEDS), which we discussed in an earlier post, detected a suspicious sample targeting Microsoft Office. After
Which malicious code would be most frightening if sinister pieces of malware could rise from the dead on Halloween? Well, malware researchers spend all their
This goes to show that application dev is not necessarily the biggest risk. Information Security isn’t tied to any single domain of IT or business.
In the everchanging landscape of social media, the latest ‘features’ can often be the newest vulnerabilities. Social engineering techniques have become very sophisticated, and can
Source: http://barracudalabs.com/2013/10/php-net-compromise/ It was announced that the PHP website was hacked and serving malware. If the attackers had access to their internal servers, can we
VERIS as described by it’s creators: “One of the most critical and persistent challenges plaguing efforts to manage information risk is a lack of data.
This summary includes 4 critical and 4 important vulnerabilities. Source: http://technet.microsoft.com/en-us/security/bulletin/ms13-oct
This bulletin listed 4 critical and 9 important vulnerabilities. Source: http://technet.microsoft.com/en-us/security/bulletin/ms13-sep
1420 NW Vivion Road, STE 102
Kansas City, MO 64118
3000 Riverchase Galleria, STE 700
Birmingham, AL 35244