Security Experts:

Virus & Threats
long dotted


Mozilla patches 14 vulnerabilities, including critical and high severity issues, with the release of Firefox 46 [Read More]
Kaspersky says malicious actors are increasingly abusing open source security tools such as the Browser Exploitation Framework (BeEF) [Read More]
A cyber espionage group dubbed Platinum has been abusing a Windows patching system in attacks aimed at Asian entities [Read More]
Facebook paid out a $5,000 bounty to a researcher who found a login flaw that could have been leveraged to impersonate users on other websites [Read More]
A Facebook phishing scam abuses Facebook’s app platform and its own trusted TLS certificate to be more convincing [Read More]
The information stealer malware known as Fareit and Pony Loader has been delivered using Windows PowerShell [Read More]
Hybrid Trojan GozNym spotted targeting banks in Europe using a new type of redirection attack [Read More]
HP has released security updates for various HP Data Protector iterations, in an attempt to patch a series of critical vulnerabilities that could result in remote code execution or disclosure of information. [Read More]
MIT launches bug bounty program and invites affiliates to find vulnerabilities on its domains [Read More]
Microsoft’s Windows AppLocker, a feature introduced in Windows 7 to specify which users can run apps within an organization, can be bypassed to execute remote scripts on a machine, a researcher has discovered. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Simon Crosby's picture
Attackers return again and again to vulnerable components like Flash because they can keep tapping into perennial vulnerabilities.
Jim Ivers's picture
Experienced organizations learn that security is not a drag on performance, but can provide productivity gains by eliminating security vulnerabilities early in the development process.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Jim Ivers's picture
Hackers are creative by nature, so you have to use your imagination to think like one. Once you can see your organization from a hacker’s point-of-view, you will be equipped to defend your organization like a security pro.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Jim Ivers's picture
Security must be built into IoT devices and systems just like any other application. Security practices must be followed.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?