Security Experts:

long dotted


System76 plans on disabling Intel’s Management Engine (ME) on its laptops following the discovery of several vulnerabilities [Read More]
Google’s Chrome web browser will soon prevent third-party software from injecting code into its processes. [Read More]
Siemens patches several vulnerabilities, including authentication bypass and DoS flaws, in SWT 3000 teleprotection product [Read More]
The “Dirty COW” vulnerability (CVE-2016–5195) discovered last year in Linux was incompletely patched, Bindecy researchers say. [Read More]
Cisco patches several critical vulnerabilities in WebEx, including ones that allow DoS attacks and remote code execution [Read More]
Apple’s patch for the recently disclosed root access vulnerability affecting macOS High Sierra breaks file sharing functionality. Quick fix provided [Read More]
Apple rushes to patch critical macOS High Sierra vulnerability that can be exploited to gain root access to a system [Read More]
Bugcrowd will manage payment processing for the Samsung Electronics' Mobile Security Rewards Program that was launched in September 2017. [Read More]
Siemens warns customers that the Dnsmasq vulnerabilities found recently by Google researchers affect some of its industrial communications products [Read More]
An easy-to-exploit bug in macOS High Sierra allows root access to a machine without needing a password and it’s remotely exploitable [Read More]

FEATURES, INSIGHTS // Vulnerabilities

rss icon

Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Jim Ivers's picture
Medical devices are indeed vulnerable to attack, but the industry is waking up to the breadth of the problems, and several organizations are forming a vanguard to show the way forward.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Jim Ivers's picture
If we agree that quality and security problems are both a form of defect, then we must sufficiently address both to produce software of the highest integrity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.