Security News

As soon as defences are sold as a product, hygiene suffers The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement...

Karen Roby highlights some of this weeks news coverage on TechRepublic and ZDNet. The stories include a security warning from Microsoft, a rundown of the Facebook privacy scandal and a look at the...

Array Networks announced support for intelligent Microsoft Office 365 traffic identification and routing for the company’s APV Series Application Delivery Controllers (ADCs) with the latest...

Microsoft's Protected View feature tries to protect you against potentially malicious files and documents. Here's how to use it.

Evil Clippy is a tool for creating malicious Microsoft Office macros: At BlackHat Asia we released Evil Clippy, a tool which assists red teamers and security testers in creating malicious MS...

A team of security researchers has exploited Microsoft’s patchy macro documentation to hide malicious code inside innocent-looking macros.

Email is still the fundamental driver for Office 365 and the biggest risk to data security and compliance.Email is still the fundamental driver for Office 365 and the biggest risk to data security...

Amnesty International's Hong Kong office has been hit by a years-long cyberattack from hackers with known links to the Chinese government, the rights group said Thursday. read more

Over two-thirds of attacks Russian biz spied targeted venerable Microsoft suite Russian security biz Kaspersky Lab has said more than 70 per cent of malware attacks it detected last year were made...

Email phishing is one of the most often used – and most successfully used – attack vectors that lead to cybersecurity incidents and breaches. Microsoft is the most impersonated brand “Cloud based...