Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

WikiLeaks released details on CIA hacking tool designed to record audio via the built-in microphone of Samsung smart TVs [Read More]
The number of attacks involving exploits increased by 25% last year, but the number of attacked users dropped by 20%, says Kaspersky [Read More]
LastPass patches vulnerabilities that could have allowed hackers to bypass two-factor authentication (2FA) [Read More]
Google released Chrome 58 to the stable channel for Windows, Mac and Linux to address 29 vulnerabilities, including an issue that rendered users vulnerable to Unicode domain phishing. [Read More]
Google hopes that by sharing its own experiences in developing and deploying tiered access, IT and security admins will feel empowered to develop a flexible and powerful access control system that better suits today's business. [Read More]
The ambient light sensors found in phones, tablets and laptops can be abused to steal sensitive browser data, researchers warn [Read More]
IOActive researchers found 10 vulnerabilities affecting more than 20 models of Linksys Smart Wi-Fi routers [Read More]
Cisco has released software updates to patch high severity DoS vulnerabilities in Firepower, ASA, IOS and UCM products [Read More]
Drupal has released updates for versions 8.2 and 8.3 to address a critical access bypass vulnerability [Read More]
Cylance claims that the majority of independent third-party tests are biased in favor of the incumbent vendors that use malware signature databases (as well as other techniques, including their own use of machine learning). [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jim Ivers's picture
If we agree that quality and security problems are both a form of defect, then we must sufficiently address both to produce software of the highest integrity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Dan Cornell's picture
Gaining an understanding of the tools that development teams use provides security teams with valuable insight into how developers work, how they make decisions, and the incentives that drive them.
Jim Ivers's picture
Enlightened toy manufacturers likely begin to embrace the basic concepts of IoT security and build connected toys that can be trusted by parents.
Jim Ivers's picture
Enabling developers through the right mix of tools and education just makes too much sense and generates too much value for all concerned.
Adam Meyer's picture
Cyber threat intelligence is showing us is that most threats simply exploit a series of well-documented vulnerabilities and other weak points to move along the path of least resistance – and the most profit.
Josh Lefkowitz's picture
Not adhering to responsible disclosure has the potential to amplify the threats posed by certain vulnerabilities and incidents.
Jim Ivers's picture
Many of you understand that addressing the vulnerabilities in your software is something you can no longer ignore, and are ready to get serious about software security.
Jim Ivers's picture
If your target is a connected toy, there is a new angle to consider: how secure is that toy? Is the connectivity of the toy potentially exposing personal data about your child?
David Holmes's picture
Many can figure out how to hack Smart-city services using simple techniques like replay to get free services or, in some cases, make a little bit of money.