Increased Risks from Macro-Based Malware Microsoft Office applications use macros to automate routine tasks. However, macros can contain malicious code that can be used to exploit vulnerable systems. Recently, there has been a resurgence of malware that is spread via macros. Individuals and organizations should proactively secure systems against macro-based malware. Users and administrators are [...]
TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities Systems Affected All Symantec and Norton branded antivirus products Overview Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry. Exploitation of these vulnerabilities could allow a remote attacker to take control of an [...]
NIST Released DRAFT NISTIR 8136, Mobile Application Vetting Services for Public Safety, for public comment.
NIST Released DRAFT NISTIR 8136, Mobile Application Vetting Services for Public Safety, for public comment. Link to the DRAFT NISTIR 8136 document and also to the announcement can be found on the CSRC Drafts Publications page: http://csrc.nist.gov/publications/PubsDrafts.html#NIST-IR-8136 Send comments to: MobileAppSurveyDraft@nist.gov NIST Computer Security Division email@example.com (Attn: Pat O’Reilly)
IC3 Warns of Extortion Email Schemes The Internet Crime Complaint Center (IC3) has issued an alert on extortion schemes that relate to recent high-profile data thefts. Fraudsters often use the news release of high-profile data breaches to scare victims into clicking on a link or paying a ransom. US-CERT encourages users and administrators to review [...]