Security Experts:

More Security Headlines

A new TorrentLocker campaign has been detected by Heimdal Security that is geographically focused on Sweden. [Read More]
SandJacking attack allows hackers to install malicious iOS apps on non-jailbroken devices. Vulnerability yet to be patched by Apple [Read More]
The European Parliament called on Brussels to pursue talks with Washington to remove "deficiencies" from a deal to curb government spying on the personal Internet data of EU citizens. [Read More]
Texas has entered into an Assurance of Voluntary Compliance agreement with PayPal over alleged privacy and security violations by Venmo, a company acquired by PayPal in 2013. [Read More]
A recently patched Adobe Flash Player vulnerability is being abused in a new malvertising campaign that redirects users to the Angler exploit kit (EK), Malwarebytes researchers warn. [Read More]
Chrome 51.0.2704.63 patches 42 security vulnerabilities, including 23 flaws that have been disclosed by external researchers. [Read More]
For all of last week and continuing into this week, major DNS and traffic management provider NS1 suffered a continuing and complex DDoS attack from unknown attackers with unknown motivation. [Read More]
Fraudsters are leveraging technology to perpetrate fraud, but organizations are not succeeding in using data analytics for fraud detection. [Read More]
China-linked APT actor Wekby has been using a piece of malware that leverages DNS requests for C&C communications [Read More]
An Office vulnerability patched by Microsoft last year (CVE-2015-2545) is actively exploited by APT actors and cybercriminals [Read More]

SecurityWeek Experts

rss icon

Alan Cohen's picture
If security can increasingly be distributed into the compute layer—effectively a form of self-protection—we begin to shift the playing field from attacker to defenders.
Emily Ratliff's picture
Wendy Nather coined the term “security poverty line” to describe how organizations operate when they have insufficient investment in IT security.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jim Ivers's picture
Software that protects the crown jewels of the organization and reduces risk translates to “valuable.”
Joshua Goldfarb's picture
If you’ve centralized all of your security resources, you will have a far more difficult time handling the incident than if you’ve strategically placed security resources around the globe.
David Holmes's picture
The leaked data from the Mossack Fonseca breach is supposed to illuminate dark corners of international tax evaders, but the "Panama Papers" story has many mysteries around it still.
Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Alastair Paterson's picture
By understanding the different types of incidents and the different returns, you can make a strong case for greater cyber situational awareness in the short- and long-term.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?