Microsoft Mac App Vulnerabilities Discovered
This is a news story, published by BGR, that relates primarily to Cisco Talos news.
Cisco Talos news
For more Cisco Talos news, you can click here:
more Cisco Talos newsNews about operating systems
For more operating systems news, you can click here:
more operating systems newsBGR news
For more news from BGR, you can click here:
more news from BGRAbout the Otherweb
Otherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like this article about operating systems, you might also like this article about
Mac security. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest security flaws news, app permissions news, news about operating systems, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
security featuresBGR
•Security flaws in Microsoft Mac apps could let hackers spy on you
62% Informative
Cisco Talos identified vulnerabilities in Microsoft apps for Mac that could leave you vulnerable to hackers.
Some Microsoft apps can be exploited and let hackers inject malicious libraries to gain entitlements and user-granted permissions.
Microsoft Outlook , Teams, PowerPoint , OneNote , Excel , and Word could be hacked because they use a feature called comapple.security.cs.disable-library-validation entitlement.
VR Score
39
Informative language
26
Neutral language
30
Article tone
semi-formal
Language
English
Language complexity
69
Offensive language
not offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
medium-lived
External references
3
Source diversity
2
Affiliate links
no affiliate links