Security Experts:

More Security Headlines

Rackspace, Amazon and Linode will reboot some servers over the next week while they address several vulnerabilities in the Xen hypervisor.
Silent Circle today unveiled two new devices as part of its Blackphone product line, along with a with new enterprise platform that combines devices, software and services into a privacy and security focused mobile architecture.
Serious vulnerabilities found in Seagate's business NAS solutions. The vendor is aware of the issues, but a fix is not yet available
Uber said on Friday a data breach may have allowed malicious hacker(s) to gain access to the driver’s license numbers of roughly 50,000 of its drivers.
Network Vision addresses critical code injection flaw in the IntraVUE network visualization software with the release of version 2.3.0a14.
Kaspersky Lab announced a new initiative designed to support security startups and provide expertise and advice to foster much needed talent for the IT security industry.
Users can now report accounts that distribute private information on Twitter, the social media giant announced on Thursday.
UK-based TalkTalk, a telecommunications and broadband company, confirmed that it has suffered a data breach, which names, phone numbers, addressees and account numbers of its customers were exposed to malicious actors.
A critical information leakage vulnerability dubbed JetLeak has been found in the Jetty web server. The flaw has been fixed in version 9.2.9.
Cybercriminals use phishing emails and CSRF exploits to hijack routers in Brazil and redirect victims to fake banking websites.

SecurityWeek Experts

rss icon

Jon-Louis Heimerl's picture
While you may have the greatest advantage if you know your enemy well, you are in the greatest peril if you do not know yourself well.
Rebecca Lawson's picture
As companies deploy new security technologies, understanding the impact on overall network performance should be a very important factor in the decision-making process.
Joshua Goldfarb's picture
Most enterprises collect huge quantities of data that result in shorter retention periods and longer query times. This perfect storm of circumstances creates a very real operational challenge.
James Foster's picture
Many fraudulent accounts are mere satire or innocuous trolling, but others are created with far more devious intentions.
David Holmes's picture
Is it possible to apply this maxim to global SSL patch rates? Let’s take a look at the most recent SSL vulnerability: POODLE.
Scott Simkin's picture
It doesn’t take the most advanced tools to break into the the largest corporations on the planet. Between user behavior and the types of malicious files attempting to compromise enterprises, there are a few steps you can take to reduce your risk exposure.
Pat Calhoun's picture
As enterprises continue to expand their arsenal of security products in an effort to strengthen protections against advanced threats, they often introduce complexity.
Torsten George's picture
Massive data breaches are raising doubts about whether organizations are investing their security dollars in the right areas.
Adam Ely's picture
From what to support to how to ensure the security of mobile apps and data, enterprises are banging their heads against the wall to find a solution to secure mobile.
David Holmes's picture
Many of the hardware RNGs within the load balancers can be tapped to provide real, hardware-based entropy for dozens, hundreds, or even thousands of machines within that data center.