6 Results for:PLIST

  • Sort by: 

Kaspersky opens up over spyware campaign targeting its staffers

By Alex Scroxton 24 Oct 2023

Kaspersky has shared more details of the TriangleDB spyware that was used against its own workforce by an unknown APT group Read More

Mandiant: JumpCloud breach led to supply chain attack

By Rob Wright 24 Jul 2023

Mandiant researchers attribute the supply chain attack to a North Korean threat actor that abused JumpCloud's commands framework to gain access to a downstream customer. Read More

MacOS malware attacks slipping through the cracks

By Shaun Nichols 06 Jun 2022

Apple security specialist Patrick Wardle told RSA Conference 2022 attendees that some of the worst security flaws in the macOS operating system come from overlooked bits of code. Read More

Web browser comparison of Chrome, Firefox, Safari and Edge

By Robert Sheldon, Eddie Lockhart 29 Jul 2022

Many user tasks rely on the browser used, but not all browsers are well suited to these tasks. Learn the strengths and weaknesses of each major browser. Read More

3 Intune app management practices that IT pros should know

By John Powers 08 Aug 2019

Intune admins should learn the basics of Intune app management for deploying, wrapping and securing applications. Find out why each step is crucial and how IT can accomplish them. Read More

How Google manages Chrome extensions without manually white/blacklisting each one

By Kyle Johnson 22 Apr 2019

The key is to make policies based on permissions or runtime actions, not manually whitelisting each one. Read More