Q&A with Aaron Turner: Whitelisting is on enterprise blacklist

Securing Productivity Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Google Desktop gets scarier

    As if the threats posed by Google Desktop weren't enough, Google's latest release is chock-full of new dangers -- especially to enterprises. In this tip, security guru Mike Chapple reviews Google Desktop 3 and its "Search Across Computers" feature, a... 

  • Adobe fixes critical Macromedia flaws

    Flash, Shockwave and other multimedia products could leave systems vulnerable to attack via a malicious Shockwave Flash object file. The vendor recommends users update immediately. 

  • Security Wire Weekly: Macromedia security holes, an unwanted Christmas greeting and Bank of America

    Our final broadcast of 2005 has the scoop on new security holes plaguing Macromedia users, Christmas greetings you don't want to receive and why Bank of America customers might find themselves short on cash. Listen on your PC, MP3 or download to your... 

  • Flaws affect F-Secure AV products

    The security vendor has addressed a number of vulnerabilities in its Windows and Linux antivirus product that could be exploited by attackers to escape detection, cause a denial of service or launch malicious code. 

  • Security Bytes: New flaws affect Cisco, Check Point

    Cisco confirms a security hole in its IOS HTTP Server while Symantec warns of a flaw in the Check Point VPN-1 SecureClient application. 

  • How to tame Google Desktop

    Although not classified as spyware, if left unmanaged and unmonitored desktop search engines, like Google Desktop, can introduce serious security concerns. This tip examines these risks and explains how to block or secure Google Desktop in the enterp... 

  • Windows Plug and Play has a new enemy

    Mocbot targets an already-exploited security hole Microsoft patched in August. Could it be the next Zotob? 

  • Powerful payloads: The evolution of exploit frameworks

    Attackers have new tools to launch faster, more powerful attacks. Contributor Ed Skoudis offers up some examples, some of which are very clever and very evil. 

  • Security attention shifts to critical IE, Adobe flaws

    Attack-weary users now have fresh flaws in Internet Explorer and Adobe to worry about. Microsoft has workarounds. Adobe has patches. 

  • Security Bytes: Flaws plague Adobe Reader, Acrobat

    Also: Bagle/Mitglieder targets AV programs; consumers and merchants sue credit card companies over data theft; IBM, Linux face new flaws; and CA buys security firm.