SearchSecurity

New & Notable

News

SEC failed to disclose breach from 2016

The U.S. Securities and Exchange Commission admitted a 2016 breach that was previously undisclosed may have enabled threat actors to engage in illegal stock trades.

News

Undocumented MS Word feature can be abused

An undocumented Word feature found by Kaspersky Lab could lead to system information theft and affects users on both PCs and mobile devices.

Problem Solve

How synchronization opens iCloud Keychains to attack

A verification flaw in the synchronization service of iCloud Keychain enables attackers to intercept the data it transfers. Expert Frank Siemons explains what to do about it.

News

CCleaner software update contained malware

CCleaner malware was spread to users via an infected software update for close to one month, highlighting the dangers of supply chain attacks and the need for code signing.

Topics Covered

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Information Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Information Security Basics

View All Get Started

Blog: Security Bytes

Sections from across SearchSecurity

  • News

    View All
  • Government information security management

    SEC failed to disclose breach from 2016

    The U.S. Securities and Exchange Commission admitted that a 2016 breach that was previously undisclosed may have enabled threat actors to engage in illegal stock trades.

  • Hacker tools and techniques: Underground hacking sites

    Undocumented MS Word feature can be abused

    An undocumented Word feature found by Kaspersky Lab could lead to system information theft and affects users on both PCs and mobile devices.

  • Malware, virus, Trojan and spyware protection and removal

    CCleaner software update contained malware

    CCleaner malware was spread to users via an infected software update for close to one month, highlighting the dangers of supply chain attacks and the need for code signing.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close