Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Google shares data on the malware, phishing and spam emails targeting corporate Gmail inboxes [Read More]
China-linked threat actor uses new ChChes malware in attacks aimed at Japanese academics and organizations [Read More]
Kaspersky analyzed Android apps for several connected cars and found that most of them lack crucial security features [Read More]
Many organizations in Ukraine targeted in a campaign that shares some similarities with Operation Groundbait [Read More]
Update released by Apple for GarageBand patches a code execution vulnerability discovered by Cisco Talos researchers [Read More]
High severity denial-of-service (DoS) vulnerability patched in OpenSSL 1.1.0 with the release of version 1.1.0e [Read More]
Cyber espionage group with ties to Iran and Shamoon attacks targets organizations in Middle East, particularly Saudi Arabia [Read More]
IBM researchers believe Shamoon used macro-enabled documents and PowerShell scripts to infect victims [Read More]
Microsoft informed customers that the February patches will only be released on March 14 as part of the next planned Update Tuesday [Read More]
Russian-speaking black hat breaches the systems of more than 60 universities and US government agencies [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jennifer Blatnik's picture
The interests of the researchers should be to make the world more secure, not profit from a corporation’s vulnerabilities.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Jim Ivers's picture
I know I no longer have much trust in the connected devices in my home, and wonder what they do with their spare time.
Travis Greene's picture
A reliance on Internet voting with current technology will lead to the disenfranchisement of voters and manipulation by foreign or domestic attackers.
Jim Ivers's picture
Mature organizations should adopt a blended approach that employs testing tools at various stages in the development life cycle.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.
David Holmes's picture
SWEET32 is probably not something that an enterprise administrator needs to lose sleep over. Very likely, we will never see a SWEET32 attack in the wild, just as we never have for POODLE or BEAST.
Jim Ivers's picture
When will automakers speak up about the measures they have taken to test the software embedded in their vehicles?
Dan Cornell's picture
Security teams and DevOps teams aren’t always on the same page and the lack of communication often results in misaligned priorities that significantly inhibit productivity.
Erin O’Malley's picture
Conventional email security solutions may defend against spam, viruses, and malware, but they don’t defend against ignorance or egregious stupidity.