Security Experts:

More Security Headlines

The nuclear industry still doesn’t fully understand the risk posed by cyberattacks, according to a new report from Chatham House.
North Korea is suspected of having launched a cyber attack last year on the South Korean capital's subway system that carries millions of commuters every day, a Seoul lawmaker said Monday, citing intelligence reports.
iOS malware dubbed YiSpecter abuses private APIs and enterprise certificates to infect jailbroken and non-jailbroken devices.
A serious vulnerability has been found in the Jetpack plugin for WordPress. Developers patch issue in version 3.7.1.
US online brokerage firm Scottrade said Friday it was notifying some 4.6 million customers about a hack into its database which could have leaked private information.
T-Mobile's chief executive has expressed outrage over a breach at a credit monitoring service Experian that exposed private data from 15 million customers of the mobile carrier.
Experian on Thursday announced that a server containing information on T-Mobile customers was compromised, and that information of roughly 15 million individuals has been exposed.
A senior software engineer at Google detailed on Thursday the steps taken by the Internet giant to disrupt a bank phishing campaign targeting Android users in Russia.
A mysterious piece of malware has infected tens of thousands of devices across the world, but its operator hasn’t used it for any malicious purposes.
Philip D. Quade, Chief of the NSA Cyber Task Force and Special Assistant to the Director National Security Agency for Cyber, will deliver a keynote address at the 2015 ICS Cyber Security Conference, taking place Oct. 26-29 in Atlanta, Georgia.

SecurityWeek Experts

rss icon

Eduard Kovacs's picture
US intel chief warns that Russian hackers have been targeting critical infrastructure ICS. Security experts say the threat is real.
Alan Cohen's picture
Insecurity of any time stems from a common psychological cause -- fear. Fear is generally a reaction to something immediate that threatens your security or safety. Fear itself can harm one’s judgment and prevent teams from taking action.
Rafal Los's picture
These two key pieces of data from your network infrastructure are invaluable to your security analysis - yet you likely don’t ever look at it, you most certainly don't have access to it and you probably wouldn't be able to make sense of it if you had it.
Joshua Goldfarb's picture
Rather than proceed step by step through the process of building and maturing a security operations function, security teams often want to move immediately into very advanced topics.
David Holmes's picture
Secure BGP is a long way off, but the window for obtaining fraudulent certificates via BGP hijacking may be closing anyway, as HTTP pinning sees more and more adoption.
Adam Ely's picture
Applying a zero trust model to mobile and the right security controls at the app level could align productivity and security. But the bottom line is that it’s no longer about the device; it’s about the applications.
Jason Polancich's picture
it seems most just don’t see that cyber intelligence needs to become a prioritized, resourced part of what they’re already doing.
Travis Greene's picture
In the case of Hilary Clinton's personal email server, we know that Top Secret information was transmitted over a network that likely wasn’t equipped to safeguard it. If her server was a target of foreign state actors, the implications are frightening.
Torsten George's picture
Organizations that address certain inhibitors to risk management head-on, can significantly reduce the time it takes to produce risk profiles.
Mark Hatton's picture
The country has become obsessed with a couple of pounds per square inch (PSI) in a football, yet seems to have no issue ignoring simple steps that could greatly improve our overall cyber security.