Security Experts:

long dotted


The IRS discovered that identity thieves attempted to generate E-File PINs using 464,000 stolen social security numbers [Read More]
A fake CloudFlare DDoS (distributed denial of service) check page is being used by a Nuclear exploit kit (EK) gate to load a malicious redirection page to serve malware, according to security firm Malwarebytes. [Read More]
A group of pro-Palestine hackers leaked the details of nearly 30,000 DHS and FBI employees. The DoJ is investigating [Read More]
Twitter has suspended over 125,000 accounts for threatening or promoting terrorist acts, the social media company recently announced. [Read More]
Kaspersky Lab publishes report on the Java-based cross-platform backdoor known as JSocket, Adwind, AlienSpy and Frutas [Read More]
Kaspersky Lab researchers spotted several cybercrime groups that steal money directly from banks in APT-style attacks [Read More]
Bitcoin lending platform Loanbase informs customers of data breach. Hackers stole Bitcoin from several accounts [Read More]
OS X malware installs legitimate Flash Player and attempts to trick users into installing scareware [Read More]
In its 2015 Global Threat Report, security researchers at CrowdStrike examine the main trends in the threat landscape in 2015, including the evolution of Trojans, ransomware, phishing emails, and other threats. [Read More]
A group of former and current students have sued Google in federal court in San Jose, California, alleging that the company scanned their Gmail accounts and gathered data for advertising purposes. [Read More]


rss icon

Wade Williamson's picture
Asking for security backdoors that only benefit the good guys is like asking for bullets that only hurt the bad guys. That’s simply not how encryption works.
Tim Layton's picture
By understanding your adversaries’ activity on the Dark Web , you can take more of a proactive approach that helps reduce uncertainty and improves overall cyber resiliency.
Alastair Paterson's picture
As security professionals, it’s our job to enable business while protecting it; embracing social media is an imperative, but we also need to mitigate the exploitation of what our organizations reveal online.
Scott Gainey's picture
Companies need educate employees about ransomware, and the techniques criminals use to launch attacks such as phishing emails or distribution through social media channels.
Marc Solomon's picture
Hackers are hijacking legitimate online resources to launch campaigns that ultimately show them the money.
Jason Polancich's picture
Competitive advantage is something that makes you better than the competition. Recent headlines show that hacking is everyday business for organizations just as much as it is for the cybercriminal.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
David Holmes's picture
In the initial hours after the Paris attacks by Islamic terrorists, when the PlayStation 4 rumor was first circulating, I decided to see exactly what kind of encryption the PS4 uses for its messaging system.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.