Email Alerts
-
Active PDF attacks target Reader, Acrobat zero-day vulnerability
Malicious PDF files discovered in the wild spread via an email attachment and target a yet-to-be patched hole in Adobe Reader and Acrobat. Article
-
Software piracy group offers cash to whistleblowers
An industry group made up of software companies is offering workers in the U.K. more than $30,000 to blow the whistle on pirated software in their workplace. Article
-
How do hackers bypass a code signing procedure to inject malware
In this expert Q&A, Michael Cobb reveals how malicious applications can actually be approved by Symbian's Express Signing procedure. Ask the Expert
-
How to secure a .pdf file
In this expert Q&A, Michael Cobb explains how to avoid malicious content that is embedded into .pdf documents. Ask the Expert
-
Quiz: How to build secure applications
Use this five-question quiz to test your knowledge of how to secure your enterprise apps. Quiz
-
How to detect software tampering
In their book Surreptitious Software, authors Christian Collberg and Jasvir Nasvir reveals how to tamperproof your software and make sure it executes as intended. Tip
-
Adobe fixes 29 flaws in Acrobat, Reader
Critical Adobe flaws could cause the applications to crash, enable an attacker to take full control of a victim's machine. Article
-
Adobe warns of critical update for Reader, Acrobat 9.1.3
An Adobe update next week will repair a critical zero-day flaw being actively targeted by attackers. Article
-
Microsoft SharePoint security hinges on authorization, external user management
Management of external user access controls, authentication and authorization are important Microsoft SharePoint security best practices. This is the second of a two-part series of technical tips. Tip
-
Why should we place data files on a separate partition than the OS?
You may have always been taught to install applications on a different partition than the OS, but do you actually know why? Ask the Expert
Security Management Strategies for the CIO