Security Experts:

Virus & Threats
long dotted


Facebook awards researcher $10,000 for reporting a serious syncing bug that exposed private photos.
Researchers have identified several vulnerabilities in EMC M&R and EMC Secure Remote Services. The flaws have been fixed.
Pwn2Own 2015 has come to an end. Participants earned $552,500 after exploiting a total of 21 vulnerabilities.
Most organizations believe it would take hours or more for them to detect a breach, with nearly 30 percent stating it would take days or weeks, according to a new survey.
Drupal 6 and 7 security releases address two moderately critical vulnerabilities, one of which can be exploited to access user accounts.
OpenSSL 1.0.2a, 1.0.1m, 1.0.0r, and 0.9.8zf have been released. The latest updates include fixes for several bugs and security issues.
Pwn2Own 2015 participants earned a total of $317,500 on the first day of the competition after hacking Adobe Flash, Adobe Reader, Internet Explorer, Mozilla Firefox and Windows.
For the past several months, Google has been reviewing applications before they are published on Google Play to identify violations of their developer policy.
Experts discuss some of the common security and privacy issues in mobile apps today.
HP releases security updates to address vulnerabilities in ArcSight Enterprise Security Manager (ESM) and ArcSight Logger.

FEATURES, INSIGHTS // Virus & Threats

rss icon

Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Scott Simkin's picture
While SSL decryption is necessary for maintaining network security, security admins need to establish strict rules about how they handle decrypted data.
Ryan Naraine's picture
John Hultquist, Manager of Cyber Espionage Threat Intelligence at ISIGHT Partners, joins the podcast to talk about "NEWSCASTER," a cyber espionage operation that uses fictitious social media accounts to launch attacks.
Danelle Au's picture
The protection of connected ( Internet of Things) devices is likely better performed at a network level rather than an endpoint level due to the variety of devices that may exist and the limited endpoint security functions that can be supported.
Mark Hatton's picture
The fact that you aren’t seeing or hearing about potential threats to the organization, or alarms aren’t being raised by the security team, shouldn’t make you feel better as an executive.
Torsten George's picture
A threat is the agent that takes advantage of a vulnerability. This relationship must be a key factor in the risk assessment process and can no longer be treated as risk’s neglected step child.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Mark Hatton's picture
Here are five things I recommend security pros keep in mind when navigating the line between tight security and keeping the organization running at peak proficiency.