Security Experts:

More Security Headlines

Authorities in South Korea have arrested a total of 16 individuals suspected of abusing the personal details of millions of people to earn large amounts of money.
Singapore announced new measures to strengthen cyber security to prevent a recurrence of attacks on government websites including those of its president and prime minister.
Trend Micro and McAfee talk security at the VMworld 2014 conference in San Francisco.
The attackers are using anti-Western sentiment in an attempt to trick users into downloading the malware, according to BitDefender.
According to the IT research and advisory firm, global IT security spending will reach $71.1 billion this year, which represents an increase of 7.9% compared to 2013.
The developers of the Akeeba backup extension for Joomla have fixed a vulnerability that can be leveraged to gain access to website backups.
Small and medium companies in the European automobile sector have been targeted by cybercriminals using a relatively new piece of malware, Symantec has warned.
Sony said that some of its online services were hit by a DDoS attack by a hacker group, while another group threatened that a plane carrying a company executive was carrying a bomb.
The United States Secret Service estimated more than 1,000 businesses have been infected by the "Backoff" point-of-sale malware, and many of them are unaware they have been compromised, according to a Department of Homeland Security advisory.
Industry reactions to news that group of hackers presumably located in China managed to breach Community Health Systems, one of the largest hospital operators in the United States, and steal the records of 4.5 million patients.

SecurityWeek Experts

rss icon

Torsten George's picture
A risk-driven approach addresses both security posture and business impact to increase operational efficiency, improve assessment accuracy, reduce attack surfaces, and improve investment decision-making.
Joshua Goldfarb's picture
Getting to the root cause involves a level of understanding beyond that of simply identifying that a system in infected. We need to understand what specifically enabled or facilitated the infection.
Travis Greene's picture
The significant breaches of today are executed by people infiltrating the organization, and attackers are doing this by assuming identities or abusing insider privileges.
Danelle Au's picture
Cloud service providers play a key role in delivering security, but as part of the shared responsibility model, they are not liable for access to and usage of the cloud application.
Pat Calhoun's picture
With a community of nearly 400,000 registered users, Snort remains a valuable tool for security organizations and has certainly flexed its muscles, but it may need some reinforcements to maintain its security longevity.
James McFarlin's picture
Launched in 2009, CyberPatriot began with eight high school cybersecurity teams competing for scholarships. In just six years, participation quickly expanded to more than 1500 teams around the world.
Joshua Goldfarb's picture
Amidst recent headlines, I am concerned that as a security community, we are losing sight of an important principle that is very important to remember: not all intrusions involve malware.
Scott Gainey's picture
Corporate stewards are getting educated in a hurry and are gearing up to ask some very pointed questions regarding strategy for protecting company data.
Jason Polancich's picture
Businesses have more data on hand than they think. They key is crafting a plan to track it and combine it with data from outside their own walls against which the internal data can be analyzed.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.