Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Apple's new Secure Kernel Extension Loading (SKEL) security feature, set to be implemented in the upcoming macOS 10.13 High Sierra, is trivial to bypass, a security researcher claims. [Read More]
Microsoft patches 80 vulnerabilities, including a .NET framework zero-day flaw exploited to deliver spyware [Read More]
US electronics retailer Best Buy has stopped selling products by leading computer security firm Kaspersky Lab amid concerns the company has links to Russian intelligence, the two companies confirmed Friday. [Read More]
SentinelOne has launched a new module to provide increased visibility by using kernel hooks to see cleartext traffic at the point of encryption, and again at the point of decryption. [Read More]
Bitdefender launches Bugcrowd-based public bug bounty program with rewards of up to $1,500 [Read More]
Lenovo settles FTC charges over the Superfish adware shipped with many of its laptops, but the company will not pay a fine [Read More]
Mozilla said it would completely remove trust in the digital certificates issued by Chinese certificate authority WoSign and its subsidiary StartCom starting with Firefox 58. [Read More]
Security researchers have discovered two vulnerabilities that impact the extension systems of major browsers, including Chrome, Firefox, Safari, and Opera. [Read More]
Thousands of IoT Devices are at increased risk after a list of IP addresses and credentials was published to the public. [Read More]
Vulnerabilities in PoS systems from SAP and other vendors allow hackers to steal payment card data and change prices [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Mike Lennon's picture
A new report from Palo Alto Networks examines user and application trends in the enterprise, covering 1,100 applications across 723 organizations, providing a fascinating glimpse into what’s happening within the networks of enterprises around the globe.
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...