SharePoint security best practices

Securing Productivity Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • New zero-day affects Microsoft Word

    Microsoft confirmed reports of "limited" zero-day attacks and warned customers to be cautious when opening unsolicited Word attachments. 

  • Multiple flaws in Adobe Reader, Acrobat

    Updated: Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers. A fix is now available. 

  • Source code analysis part of DoD's app security plan

    The U.S. Navy Network Warfare Command's evaluation of Ounce Labs' source code analysis technology showed how a tool such as Ounce could improve the Department of Defense's application security and reduce project costs. 

  • Podcast: Expert sees rise in sophisticated attacks

    In this edition of Security Wire Weekly, Andreas Wiegenstein, chief technology officer of Virtual Forge discusses why application security attacks are becomming more sophisticated. 

  • Secure voting: Source code analysis tool key to absentee ballot system

    PostX turned to the Fortify Source Code Analysis tool for help developing an absentee ballot request system for the U.S. Armed Forces. The system allows deployed military personnel to securely request and receive absentee ballot packages via the Web ... 

  • Exploit code targets unpatched PowerPoint flaw

    Microsoft is investigating reports of a new, unpatched flaw attackers could exploit using malicious PowerPoint files. Proof-of-concept exploit code has been released. 

  • Microsoft delivers 10 patches and tool update

    Updated: Microsoft released six critical patches and updated a software tool Tuesday, but a technical problem prevented the company from pushing the fixes out via its automated tools. 

  • Hijacked consumer machines target the enterprise

    Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price. 

  • New Microsoft Word zero-day exploit discovered

    Updated: Trojan.MDropper-Q is exploiting a vulnerability in Microsoft's word-processing application that could allow attackers to take control of certain machines. 

  • Twin Trojans use PowerPoint to spread

    Updated: Two new Trojan horse programs are exploiting a vulnerability in PowerPoint, researchers say. But Microsoft denies there's a new flaw.