Security Experts:

More Security Headlines

Updates released by ISC for the BIND DNS software patch a high severity DoS vulnerability that can be exploited remotely [Read More]
The Locky ransomware has adopted a new ".ODIN" extension appended to encrypted files, and gone back to using command and control (C&C) servers. [Read More]
Cisco researchers crack DGA used by GozNym banking Trojan and start sinkholing botnets. 23,000 infections observed in first 24 hours [Read More]
As new IPv4 addresses are more and more difficult to come by, spammers are increasingly hijacking existing IP address ranges for their nefarious purposes. [Read More]
Chicago hacker Edward Majerczyk, who stole nude photos from the accounts of at least 30 celebrities, pleaded guilty Sept. 27 in U.S. federal court. [Read More]
Microsoft and Bank of America Merrill Lynch on Tuesday announced they are working together to make financial transactions more efficient with blockchain technology -- the foundation of bitcoin digital currency. [Read More]
Apple admitted to an issue affecting the encryption strength for backups of devices on iOS 10 when backing up to iTunes on the Mac or PC and said a fix would be included in an upcoming update. [Read More]
Google releases two new tools to help developers prevent XSS attacks using content security policy (CSP) [Read More]
Microsoft announced improved security for its Edge browser in the form of Windows Defender Application Guard, a tool that leverages virtualization-based security technology for user protection. [Read More]
German data protection authorities have blocked Facebook from collecting subscriber data from its subsidiary WhatsApp, citing privacy concerns. [Read More]

SecurityWeek Experts

rss icon

David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Rafal Los's picture
How do you win when you don’t know the rules? Adaptation is key. Even if you don’t know the rules, you know the game.
Ken McAlpine's picture
Perhaps it’s time to look at Open Security as the next necessary iteration of deploying security technology.
Jim Ivers's picture
When will automakers speak up about the measures they have taken to test the software embedded in their vehicles?
Barak Perelman's picture
Securing ICS networks is an extremely challenging task, as they lack many of the threat monitoring, detection, and response capabilities commonly found in IT infrastructures.
Dan Cornell's picture
Security teams and DevOps teams aren’t always on the same page and the lack of communication often results in misaligned priorities that significantly inhibit productivity.
Joshua Goldfarb's picture
Everyone loves a pretty picture or a slick graph, but very rarely do these supposed visualizations add any real value to security operations.
Wade Williamson's picture
A data center will often encounter an attacker at a far more mature phase of attack than the perimeter will, and likewise, will experience different types of threats and attack techniques.
Adam Meyer's picture
Cyber threat intelligence isn’t just another tool or layer of protection for your organization. It’s a capability that drives more effective cybersecurity decisions and more investment.
David Holmes's picture
SSL/TLS-encrypted traffic has become so common today that the attack communication with bots now goes undetected by these security solutions.