860 Results for:PDF

  • Sort by: 

Attack by TIFF images: What are the vulnerabilities in LibTIFF?

By Michael Cobb 10 Mar 2017

Attackers using crafted TIFF images can exploit flaws in the LibTIFF library to carry out remote code execution. Expert Michael Cobb explains how these vulnerabilities work. Read More

Densify: hey, you, get off of your (wasted) cloud

By Adrian Bridgwater 22 Aug 2019

CRM is, of course, Customer Relationship Management... apart from when it's not. Some days, CRM is CRM (as above)... but, increasingly, CRM is also Cloud Resource Management. This is a software ... Read More

Government to provide local data to proptechs

By Angelica Mari 22 Oct 2019

Minister announces creation of a national index of brownfield site data and other initiatives to allow startups and property development companies to use public data to generate business Read More

Ten Windows 10 Fall Creators Update features to know

By Robert Sheldon 17 Jan 2018

Microsoft introduced some significant changes to Windows 10 in the Fall Creators Update. The My People app, for example, lets users pin contacts to their task bars. Read More

Security Think Tank: Why and how cyber criminals exploit world events

By Paddy Francis 06 Apr 2020

In our globalised world, high-profile events such as Covid-19 have huge business impacts, some of which may be felt by CISOs. What responsibilities do security professionals have in such circumstances? Read More

Develop an interactive DevOps runbook

By Kurt Marko 14 Feb 2022

Runbooks are important for DevOps processes -- simple or complex -- but they can be a beast to write. Use this expansive guide for best practices and arrangement. Read More

Coronavirus phishing scams increase amid pandemic's spread

By Katie Donegan 26 Mar 2020

Organizations must account for a sharp uptick of coronavirus phishing scams in their pandemic and business continuity plans. Learn about the trend here, with steps for mitigation. Read More

Cyber attackers exploiting poor cloud security

By Warwick Ashford 22 Aug 2019

More than a third of organisations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene Read More

Microsoft plugs Windows zero-day for February Patch Tuesday

By Tom Walat 10 Feb 2021

Microsoft addresses 56 total unique vulnerabilities, including six that were publicly disclosed, and gives administrators their second dose for August's Zerologon issue. Read More

How can users protect themselves from the DocuSign phishing email?

By Judith Myerson 20 Jul 2017

A DocuSign phishing email with a link to a malicious Word document recently targeted the company's users. Expert Judith Myerson outlines six ways to avoid this type of attack. Read More