Q&A with Aaron Turner: Whitelisting is on enterprise blacklist

Securing Productivity Applications

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Adobe Reader flaws spook security experts

    Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. 

  • Third zero-day found in Microsoft Word

    For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources. 

  • Microsoft suffers third zero-day in a week

    A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week. 

  • Zero-day flaw found in Windows Media Player

    Attackers could exploit a new zero-day flaw in Windows Media Player to cause a denial of service or launch malicious code. The threat is Microsoft's second zero-day flaw in a week. 

  • New zero-day affects Microsoft Word

    Microsoft confirmed reports of "limited" zero-day attacks and warned customers to be cautious when opening unsolicited Word attachments. 

  • Multiple flaws in Adobe Reader, Acrobat

    Updated: Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers. A fix is now available. 

  • Source code analysis part of DoD's app security plan

    The U.S. Navy Network Warfare Command's evaluation of Ounce Labs' source code analysis technology showed how a tool such as Ounce could improve the Department of Defense's application security and reduce project costs. 

  • Podcast: Expert sees rise in sophisticated attacks

    In this edition of Security Wire Weekly, Andreas Wiegenstein, chief technology officer of Virtual Forge discusses why application security attacks are becomming more sophisticated. 

  • Secure voting: Source code analysis tool key to absentee ballot system

    PostX turned to the Fortify Source Code Analysis tool for help developing an absentee ballot request system for the U.S. Armed Forces. The system allows deployed military personnel to securely request and receive absentee ballot packages via the Web ... 

  • Exploit code targets unpatched PowerPoint flaw

    Microsoft is investigating reports of a new, unpatched flaw attackers could exploit using malicious PowerPoint files. Proof-of-concept exploit code has been released.