| Security Research News |
| Showing 'Security Research News' from 1 to 10|
| |3 Strategies For Building An Information Protection Program Five years ago, we started on a journey to update and simplify information protection at Microsoft. We’ve learned a lot about data protection and tools and today we’re sharing some of our best practices.
The post 3 strategies for building...
| |Tracing The Supply Chain Attack On Android Earlier this month, Google disclosed that a supply chain attack by one of its vendors resulted in malicious software being pre-installed on millions of new budget Android devices. Google didnt exactly name those responsible, but said it...
| |Using Whitelisting To Remediate An RCE Vulnerability (CVE-2019-2729) In Oracle WebLogic Oracle WebLogic has recently disclosed and patched remote-code-execution (RCE) vulnerabilities in its software, many of which were due to insecure deserialization. Oracle addressed the most recent vulnerability, CVE-2019-2729, in an out-of-band...
| |Stopping Stalkerware: What Needs To Change? What technology makers and others can – and should – do to counter the kind of surveillance that starts at home
The post Stopping stalkerware: What needs to change? appeared first on WeLiveSecurity
| |Hackers Breach NASA, Steal Mars Mission Data The infiltration was only spotted and stopped after the hackers roamed the network undetected for almost a year
The post Hackers breach NASA, steal Mars mission data appeared first on WeLiveSecurity
| |5 Principles Driving A Customer-obsessed Identity Strategy At Microsoft The cloud era has fundamentally changed the way businesses must think about security and identity. Learn the five principles driving the customer-obsessed identity strategy at Microsoft.
The post 5 principles driving a customer-obsessed...
| |Inside Out: Get To Know The Advanced Technologies At The Core Of Microsoft Defender ATP Next Generation Protection While Windows Defender Antivirus makes catching 5 billion threats on devices every month look easy, multiple advanced detection and prevention technologies work under the hood to make this happen. Multiple next-generation protection engines...
| |CVE-2019-8635: Double Free Vulnerability In Apple MacOS Lets Attackers Escalate System Privileges And Execute Arbitrary Code We discovered a double free vulnerability (assigned as CVE-2019-8635) in macOS. The vulnerability is caused by a memory corruption flaw in the AMD component. If successfully exploited, an attacker can implement privilege escalation and...
| |Privacy Legislation May Soon Affect Smaller Businesses Why smaller businesses cannot afford to ignore how they gather, store and protect data
The post Privacy legislation may soon affect smaller businesses appeared first on WeLiveSecurity
| |The Evolution Of Microsoft Threat Protection, June Update Learn about new Microsoft Threat Protection capabilities now in public preview.
The post The evolution of Microsoft Threat Protection, June update appeared first on Microsoft Security.
| 1 2 3 4 5 6 7 8 9 10 Older » |