860 Results for:PDF
- Sort by:
Attack by TIFF images: What are the vulnerabilities in LibTIFF?
10 Mar 2017Attackers using crafted TIFF images can exploit flaws in the LibTIFF library to carry out remote code execution. Expert Michael Cobb explains how these vulnerabilities work. Read More
Densify: hey, you, get off of your (wasted) cloud
22 Aug 2019CRM is, of course, Customer Relationship Management... apart from when it's not. Some days, CRM is CRM (as above)... but, increasingly, CRM is also Cloud Resource Management. This is a software ... Read More
Government to provide local data to proptechs
22 Oct 2019Minister announces creation of a national index of brownfield site data and other initiatives to allow startups and property development companies to use public data to generate business Read More
Ten Windows 10 Fall Creators Update features to know
17 Jan 2018Microsoft introduced some significant changes to Windows 10 in the Fall Creators Update. The My People app, for example, lets users pin contacts to their task bars. Read More
Security Think Tank: Why and how cyber criminals exploit world events
06 Apr 2020In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Read More
Develop an interactive DevOps runbook
14 Feb 2022Runbooks are important for DevOps processes -- simple or complex -- but they can be a beast to write. Use this expansive guide for best practices and arrangement. Read More
Coronavirus phishing scams increase amid pandemic's spread
26 Mar 2020Organizations must account for a sharp uptick of coronavirus phishing scams in their pandemic and business continuity plans. Learn about the trend here, with steps for mitigation. Read More
Cyber attackers exploiting poor cloud security
22 Aug 2019More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene Read More
Microsoft plugs Windows zero-day for February Patch Tuesday
10 Feb 2021Microsoft addresses 56 total unique vulnerabilities, including six that were publicly disclosed, and gives administrators their second dose for August's Zerologon issue. Read More
How can users protect themselves from the DocuSign phishing email?
20 Jul 2017A DocuSign phishing email with a link to a malicious Word document recently targeted the company's users. Expert Judith Myerson outlines six ways to avoid this type of attack. Read More