JUser: :_load: Unable to load user with ID: 3653

Displaying items by tag: Microsoft Word

The extent to which the smartphone market is being flooded with new devices can be gauged from the fact that this week — with the economy in the toilet due to the ongoing coronavirus pandemic — there have been four companies announcing new wares.

Published in Open Sauce

A new remote access trojan named Parasite HTTP uses macros in Microsoft Word documents to spread and is modular, allowing for the addition of new capabilities.

Published in Security

Vulnerabilities in Adobe's Flash Player took second place to flaws in Microsoft products last year in a list of the most used avenues of attack by cyber criminals compiled by security firm Recorded Future.

Published in Security

A bitcoin-stealing phishing campaign has been launched by the international cyber crime group Lazarus, the security firm McAfee claims. It is aimed at Windows machines.

Published in Security

An undocumented feature in Microsoft Word allows malicious attackers to collect information about the operating system and versions of software on the computer of a prospective victim, researchers at Kaspersky Lab claim.

Published in Security

Microsoft Word documents containing executables are being used to attack the healthcare and education industries, with the ransomware being transmitted known as Defray.

Published in Security
Saturday, 15 June 2013 07:32

Microsoft Office comes to iPhone

Apple has quietly followed up a week of surprises with a massive one - an iPhone version of Microsoft Office.

Published in Mobility
Friday, 08 February 2013 16:32

Rush update for Flash Player

Despite Adobe's quarterly update cadence, the company has again been forced to deliver an out of cycle update in the face of active exploits of two vulnerabilities. The company has given the Windows and OS X updates its highest priority rating.

Published in Security

Duqu discoverer CrySyS has obtained an installer for the malware. An analysis published by Symantec reveals that it exploits a zero-day vulnerability.

Published in Security




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News