Security Experts:

More Security Headlines

European authorities in France and Italy, in collaboration with Europol, shut down an international group responsible for large-scale ATM skimming and money laundering. [Read More]
Austrian aircraft parts maker FACC said that it has fired its chief executive of 17 years after cyber criminals stole some 50 million euros ($55.7 million) in a so-called "fake president" scam. [Read More]
Pastejacking attacks allow hackers to add arbitrary data to the clipboard and trick users into executing malicious code [Read More]
More than 60 percent of all computer software installed in the Asia-Pacific in 2015 was unlicensed, the worst of any region, despite growing economies and anti-piracy efforts, an industry watchdog said Wednesday. [Read More]
Agari, a provider security solutions that help detect email-based cyberattacks, today announced that it has raised $22 million in a Series D funding round, bringing the total raised by the company to $44.7 million. [Read More]
SWIFT CEO Gottfried Leibbrandt revealed a five-point plan designed to harden SWIFT transactions following the $81 million theft via the Bangladesh central bank. [Read More]
A series of attacks carried out against banks in the Middle East in early May were using Macros and unique PowerShell scripts that are not commonly seen in crimeware campaigns, researchers at FireEye warn. [Read More]
A WPAD protocol vulnerability can be exploited by malicious actors for MitM attacks over the Internet [Read More]
Microsoft intends to dominate the corporate cloud, and everything it does is based on that intention. Google, however, seems to have lost its way. [Read More]
As ransomware authors continue to increase their presence on the threat landscape, the group behind the DMA Locker malware is getting ready for massive distribution, Malwarebytes researchers warn. [Read More]

SecurityWeek Experts

rss icon

Emily Ratliff's picture
Wendy Nather coined the term “security poverty line” to describe how organizations operate when they have insufficient investment in IT security.
Ryan Naraine's picture
Thomas Rid, Professor in the Department of War Studies at King’s College London, joins the podcast to discuss the lack of nuance in the crypto debate and the future of global cyber conflict.
Jim Ivers's picture
Software that protects the crown jewels of the organization and reduces risk translates to “valuable.”
Joshua Goldfarb's picture
If you’ve centralized all of your security resources, you will have a far more difficult time handling the incident than if you’ve strategically placed security resources around the globe.
David Holmes's picture
The leaked data from the Mossack Fonseca breach is supposed to illuminate dark corners of international tax evaders, but the "Panama Papers" story has many mysteries around it still.
Adam Meyer's picture
All three types of intelligence help drive decisions and ultimately outcomes, but at different levels within the business.
Alastair Paterson's picture
By understanding the different types of incidents and the different returns, you can make a strong case for greater cyber situational awareness in the short- and long-term.
Jack Danahy's picture
Typical lockdown or encryption of a system happens within a minute or two of the ransomware’s execution. At that point, there are only two choices left: pay or start cleaning up.
Torsten George's picture
What do enterprises need to know about ransomware attacks and what can they do to minimize the risk of being victimized?
Travis Greene's picture
Passwords really are that bad, and we now have another mandate to address this ongoing issue, or, the so-called elephant in the room: The growing push for multi-factor authentication.