Security Experts:

More Security Headlines

The worm is being used to commit fraud on social networks such as Facebook and Twitter, researchers believe.
IDA users provided new license keys and asked to change passwords after Hex-Rays detects data breach. The company says it was a targeted attack.
Iran said on Tuesday it had foiled a cyber-attack on the Islamic republic's oil ministry, and that those behind the hacking attempt were based in the United States.
Cybercriminals are using an exploit kit to hijack routers and change their DNS settings. At least 55 router models are targeted.
Securify finds multiple vulnerabilities in Synology NAS software. The vendor has released software updates to fix the security bugs.
The Wassenaar Arrangement proposal published by BIS doesn't address previously raised concerns. Experts are worried about the negative impact on the industry.
Research from Distil Networks shows that bad bots represented more than eight percent of mobile web traffic in 2014.
Researchers at FireEye have spotted a spam campaign that is also distributing a new family of point-of-sale malware.
Scareware disguised as Minecraft apps on Google Play downloaded by users up to 28 million times, says ESET.
Security researcher who found a way to get unlimited coffee by hacking Starbucks gift cards says he was threatened by the company.

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Life is full of distractions, and the information security profession is not immune to them. Security professionals have an obligation to remain focused on building, maturing, and improving our security programs and security postures.
Torsten George's picture
How can companies deal with this challenge and transition to a model that uses more data to assess risks? One way is to implement cyber security operational risk management best practices.
Rafal Los's picture
Security leaders struggle to replicate successes from one enterprise to another largely because they are starting from scratch at every new turn.
Jason Polancich's picture
Cyber defense must develop from a solid foundation in verifiable data into repeatable, measurable processes that mitigate or eliminate risk. With simple risk intelligence, any business can go from nothing to something much faster.
Marc Solomon's picture
By embedding security everywhere across the extended network, not only does security become more effective against advanced attacks, it also becomes a business enabler.
Travis Greene's picture
Security teams must bear equal, if not more responsibility, for reducing the risk of credential fatigue leading to inadvertent exposure.
Mark Hatton's picture
In the world of security, there is often a significant difference between perceived reality and what is actually happening, and the public’s perception of security within your organization can be just as important as reality.
Adam Ely's picture
The mobile strategist will play a pivotal role in mobile integration, as they pave the way for the organizations to do so purposefully and securely.
David Holmes's picture
After the rounds of predictions for 2014, I had bet my colleague that if no mobile DDoS appeared this year, we’d stop talking about it. And it looks like we can.
Rafal Los's picture
Prioritizing is an unenviable job many security professionals must do every day – do you go live with a product on time, or do you hold it to fix that security bug which could cause a catastrophic failure?