Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

ISC patches remotely exploitable BIND vulnerability that is not exploited in attacks, but has caused some DNS servers to crash [Read More]
A newly discovered variant of the Mirai Internet of Things (IoT) botnet is targeting devices with ARC (Argonaut RISC Core) embedded processors, researchers warn. [Read More]
Google researcher finds critical remote code execution vulnerability in Transmission BitTorrent app. An official fix has yet to be released [Read More]
BlackBerry launches Jarvis, a tool that helps companies in the automotive and other sectors scan their code for vulnerabilities and achieve compliance [Read More]
Facebook patches vulnerabilities that could have been exploited to hack accounts via Oculus app [Read More]
ICS-CERT conducted over 170 assessments in critical infrastructure organizations in 2017 – main weakness remains improper boundary protection, but shared user accounts are increasingly problematic [Read More]
A new variant of the disk-wiper malware known as KillDisk has been spotted in attacks aimed at financial organizations in Latin America [Read More]
Vulnerability described as a backdoor patched in Flex System, RackSwitch and BladeCenter switches from Lenovo and IBM [Read More]
Vulnerabilities allow hackers to take control of Phoenix Contact industrial switches and disrupt operations, researchers warn [Read More]
Acer, Asus, Dell, Fujitsu, HP, IBM, Lenovo and other device manufacturers start releasing BIOS updates to patch Meltdown and Spectre CPU vulnerabilities [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Torsten George's picture
The end user community is at the mercy of security researchers to act responsibly in order to limit the potential for their findings to be used for malicious purposes.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.