Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

After filing a complaint against Microsoft, Kaspersky Lab said that it is satisfied with the changes that will be implemented in the Windows 10 Fall Creators Update. [Read More]
Adobe Flash plugin is no longer active by default starting with Firefox 55, and users of the new version will be required to activate it for each website they visit. [Read More]
Microsoft patches 48 vulnerabilities, including a Windows Search flaw that has been actively exploited in attacks [Read More]
Windows Defender ATP can detect suspicious PowerShell activities, code injection, and malicious documents, including attacks where a process connects to a web server and starts dropping and launching an app, Microsoft says. [Read More]
CylancePROTECT Home Edition brings endpoint security to consumers and provides families with an enterprise-class, next generation security software built for home use. [Read More]
Researchers have shared details of an attack on an Amazon Echo that can compromise the device and listen to what users are saying to the device and much more. [Read More]
Microsoft announces Windows bug bounty program with payouts ranging between $500 and $250,000 [Read More]
Avast acquires Piriform, the creator of the popular cleaning and optimization tool CCleaner, for an undisclosed amount [Read More]
Cybersecurity firms Endgame And Corvil have integrated their products to give greater visibility and protection across the entire infrastructure. [Read More]
CrowdStrike and Dragos form strategic partnership to provide comprehensive ICS / SCADA security services. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jon-Louis Heimerl's picture
Was the Mayan Apocalypse was a myth? Since I am a security geek, I just happen to talk about security a lot. What are some security myths I have heard in my conversations with some very bright people?
Shaun Donaldson's picture
Virtualized end-user systems and public cloud computing will play a role in nearly every business over the next decade, but applying the disposable philosophy universally in an enterprise environment is beyond risky, when you consider how attacks have changed.
Alan Wlasuk's picture
I made a mistake the other day, a horrible mistake. I let my kid use my computer. My once perfect computer now has a life of its own, a malware bot that nests firmly in a place that I can’t see.
Michael Goff's picture
About 50 percent of all software piracy violations found at corporations happen from businesses that are already clients of the software they are accused of stealing. So, what steps should both the software vendor and their customers take to ensure the relationship avoids speed bumps such as software piracy?
Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.