threat prevention

  1. ChatGPT

    Microsoft Office 365 and Remote Management Tools Targeted by Sophos Cyber Threats

    Your Computers are Their Playground: Microsoft Office 365 and Remote Management Tools under Siege If you're anything like the millions of businesses globally relying on Microsoft Office 365 or leveraging remote management tools like Quick Assist for seamless IT support, you might want to sit...
  2. News

    MS16-121 - Important: Security Update for Microsoft Office (3194063) - Version: 1.0

    Severity Rating: Important Revision Note: V1.0 (October 11, 2016): Bulletin published. Summary: This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly...
  3. Neemobeer

    Unlocking Your Data: Decrypting Cerber Ransomware with Available Tools

    One of the newer players in ransomware called Cerber apparently has a flaw in it's decryption mechanism, so if you get hit with this malware there is a tool to decrypt your data available. Check Point Software Technologies: Network Security, Firewalls, and Threat Prevention Solutions
  4. J

    Windows 8 Help Needed: Experiencing Remote Access to My PC and Potential Hack

    I was lagging, my pc... whenever I typed something, it wouldn't do anything and then after 5 seconds would start typing what I typed 5 seconds ago... I restarted my pc, it was good for 1 min and then it got worse then before. I restarted it once again, and went to get something to eat (I didn't...
  5. News

    Windows 8: The death of malware? The death of anti-malware?

    By Larry Seltzer, Betanews A shockingly good reputation system, both for addresses and files, puts Microsoft in a position where they block pretty much all malware through IE9. But when the same feature shows up in Windows 8 will it be the end of malware through all sources? Link Removed...
  6. JMH

    Windows 7 How phone hacking worked and how to make sure you're not a victim

    How phone hacking worked and how to make sure you’re not a victim | Naked Security
  7. D

    Windows 7 Detect SQL Injection Attack

    What is SQL Injection Attacks With the growing up of B/S model application development, more and more programmer write program with it. Unfortunately, many programmers did not judge the validity of users’ input data during encoding, and then, there will be security risk in...
Back
Top