Increased Risks from Macro-Based Malware

Increased Risks from Macro-Based Malware Microsoft Office applications use macros to automate routine tasks. However, macros can contain malicious code that can be used to exploit vulnerable systems. Recently, there has been a resurgence of malware that is spread via macros. Individuals and organizations should proactively secure systems against macro-based malware. Users and administrators are [...]

By |March 7th, 2019|Uncategorized|Comments Off on Increased Risks from Macro-Based Malware

TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities

  TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities Systems Affected All Symantec and Norton branded antivirus products Overview Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry. Exploitation of these vulnerabilities could allow a remote attacker to take control of an [...]

By |July 6th, 2016|Uncategorized|Comments Off on TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities

NIST Released DRAFT NISTIR 8136, Mobile Application Vetting Services for Public Safety, for public comment.

NIST Released DRAFT NISTIR 8136, Mobile Application Vetting Services for Public Safety, for public comment.   Link to the DRAFT NISTIR 8136 document and also to the announcement can be found on the CSRC Drafts Publications page: 
http://csrc.nist.gov/publications/PubsDrafts.html#NIST-IR-8136   Send comments to: MobileAppSurveyDraft@nist.gov NIST Computer Security Division 
webmaster-csrc@nist.gov (Attn: Pat O’Reilly)

By |June 2nd, 2016|Uncategorized|Comments Off on NIST Released DRAFT NISTIR 8136, Mobile Application Vetting Services for Public Safety, for public comment.

IC3 Warns of Extortion Email Schemes

IC3 Warns of Extortion Email Schemes The Internet Crime Complaint Center (IC3) has issued an alert on extortion schemes that relate to recent high-profile data thefts. Fraudsters often use the news release of high-profile data breaches to scare victims into clicking on a link or paying a ransom. US-CERT encourages users and administrators to review [...]

By |June 2nd, 2016|Uncategorized|Comments Off on IC3 Warns of Extortion Email Schemes

Contact Us

Outer Edge Technology
485 Devon Park Drive, Suite 102
Wayne PA 19087
Phone: (866) 979-9605
Email: info@outeredge.biz

Speak With a Business IT Expert Today

Call us at (866) 979-9605 or simply fill out the form below and we'll contact you shortly!

Your choice regarding cookies on this site

This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Cookie Policy.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.