Security Experts:

Virus & Threats
long dotted


Google researcher Tavis Ormandy has warned that Comodo’s Chrome-based web browser Chromodo disables all web security [Read More]
Researchers have found a vulnerability in eBay that can be exploited for phishing and malware attacks, but the e-commerce giant believes the risk is low [Read More]
WordPress 4.4.2 patches open redirect and SSRF vulnerabilities, along with 17 functionality bugs [Read More]
Anti-malware firm Malwarebytes launches bug bounty program, offering rewards between $100 and $1,000 [Read More]
Cybercriminals behind the Dridex botnet have ramped up their email campaign activity following a short holiday season break, researchers at FireEye Labs say. [Read More]
Facebook has awarded a researcher $7,500 for reporting a serious XSS vulnerability that could have been exploited to hack accounts [Read More]
OpenSSL 1.0.2f released to patch a high severity vulnerability that can be exploited by hackers to decrypt TLS traffic [Read More]
The attackers behind the recent campaign targeting Ukraine have started delivering BlackEnergy malware using malicious Word documents [Read More]
LG has released a security update for some of its latest smartphones to resolve a severe vulnerability found in the Smart Notice application. [Read More]
Israel’s Electricity Authority recently suffered a cyber incident, but it appears to be a simple ransomware infection instead of a sophisticated targeted attack [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jim Ivers's picture
Experienced organizations learn that security is not a drag on performance, but can provide productivity gains by eliminating security vulnerabilities early in the development process.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Jim Ivers's picture
Hackers are creative by nature, so you have to use your imagination to think like one. Once you can see your organization from a hacker’s point-of-view, you will be equipped to defend your organization like a security pro.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Jim Ivers's picture
Security must be built into IoT devices and systems just like any other application. Security practices must be followed.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.