Security Experts:

Virus & Threats
long dotted


Facebook paid out a $5,000 bounty to a researcher who found a login flaw that could have been leveraged to impersonate users on other websites [Read More]
A Facebook phishing scam abuses Facebook’s app platform and its own trusted TLS certificate to be more convincing [Read More]
The information stealer malware known as Fareit and Pony Loader has been delivered using Windows PowerShell [Read More]
Hybrid Trojan GozNym spotted targeting banks in Europe using a new type of redirection attack [Read More]
HP has released security updates for various HP Data Protector iterations, in an attempt to patch a series of critical vulnerabilities that could result in remote code execution or disclosure of information. [Read More]
MIT launches bug bounty program and invites affiliates to find vulnerabilities on its domains [Read More]
Microsoft’s Windows AppLocker, a feature introduced in Windows 7 to specify which users can run apps within an organization, can be bypassed to execute remote scripts on a machine, a researcher has discovered. [Read More]
Malicious actors abused PowerShell and Google Docs to deliver the reconnaissance Trojan known as Laziok [Read More]
Adobe patches important DOM-based XSS vulnerability in Analytics AppMeasurement for Flash library [Read More]
Facebook awarded a researcher $10,000 after he reported a vulnerability and found a malicious backdoor on a server [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jim Ivers's picture
Developers are not trained in security and security is not yet an adequately integrated component of the development process. We are not applying good, or even minimal, security practices.
Emily Ratliff's picture
Writing yet another “security” paper isn’t going to do the trick. Security practitioners need to do a better job of getting our messages integrated into core developer documentation.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Jim Ivers's picture
The Internet of Things (IoT) will result in billions of connected devices coming on line in the next ten years, and the associated software will be built by industries that traditionally have not emphasized software security.
Emily Ratliff's picture
When you run an application, how can you verify that what you are running was actually built from the code that a trusted developer wrote?
David Holmes's picture
A determined attacker could almost certainly find another, easier (non-SSL) vulnerability much faster and cheaper than by using DROWN.
Jim Ivers's picture
Aside from tools, there are many types of application security testing that can be used to find vulnerabilities in software. An organization must consider multiple software security testing methods to really manage its risk.
Torsten George's picture
The benefits of automatic patching far exceed the risks, but with differing risk perceptions and tolerance levels, the decision must be made by each organization.
Jim Ivers's picture
What is missing from the conversation is how large a role software plays in the IoT equation. Plugging something into the Internet does not make it work -- it just makes it vulnerable.
Mike Lennon's picture
For the past several years, enterprise security leaders have been challenged with the task of locking down endpoints with traditional security solutions that are proving to be ineffective against todays threats.