HITBSecConf2017 Amsterdam (April 10th - 14th)
Register Online Now!
Five years after rolling out Office 2011 for Mac, Microsoft has made a first public preview of its successor, Office 2016 for Mac, available to testers for download.
Microsoft already has updated OneNote and Outlook (available in limited preview form) available for the Mac. Today, March 5, the company is delivering refreshed public previews of those two apps in addition to the first public previews of the 2016 versions of Word, Excel and PowerPoint, and is making all five apps available to anyone running Yosemite (Mac OS 10.10).
Measure twice, cut once -- this wise adage explains the value of pausing and making sure you know the potential results of your decisions. With Office 365, there are so many different plans and options that it's important to know what you gain (or lose) before you choose one.
Security firms Kaspersky and AlienVault have teamed up to analyze an interesting spear phishing campaign that’s aimed at Uyghur users. Attacks against this community are not uncommon, but it appears that cybercriminals are not willing to give up just yet.
The attackers rely on maliciously crafted Microsoft Word documents which exploit a vulnerability that affects Microsoft Office for Mac. The security hole in question was addressed by Microsoft in the summer of 2009, but it appears it can still be used successfully in targeted attacks.
It's still not official, but the evidence that Microsoft is bringing Office to the iPad and iPhone is growing in abundance. At this point, it seems to be an inevitability that Redmond will release Office apps for iOS in some form in early 2013, with Android apps following soon after.
Researchers have found a new attack that employs two separate pieces of malware, a malicious Word document and some techniques for maintaining persistence on compromised machines, and the campaign is specifically targeted at Mac users. The attack exploits a three-year-old vulnerability in the way that Office for Mac handles certain Word files, according to researchers at AlienVault, who discovered and analyzed the attacks.