6 Results for:PLIST
- Sort by:
Kaspersky opens up over spyware campaign targeting its staffers
24 Oct 2023Kaspersky has shared more details of the TriangleDB spyware that was used against its own workforce by an unknown APT group Read More
Mandiant: JumpCloud breach led to supply chain attack
24 Jul 2023Mandiant researchers attribute the supply chain attack to a North Korean threat actor that abused JumpCloud's commands framework to gain access to a downstream customer. Read More
MacOS malware attacks slipping through the cracks
06 Jun 2022Apple security specialist Patrick Wardle told RSA Conference 2022 attendees that some of the worst security flaws in the macOS operating system come from overlooked bits of code. Read More
Web browser comparison of Chrome, Firefox, Safari and Edge
29 Jul 2022Many user tasks rely on the browser used, but not all browsers are well suited to these tasks. Learn the strengths and weaknesses of each major browser. Read More
3 Intune app management practices that IT pros should know
08 Aug 2019Intune admins should learn the basics of Intune app management for deploying, wrapping and securing applications. Find out why each step is crucial and how IT can accomplish them. Read More
How Google manages Chrome extensions without manually white/blacklisting each one
22 Apr 2019The key is to make policies based on permissions or runtime actions, not manually whitelisting each one. Read More