Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Adobe fixes only one moderate severity “business logic error” in Flash Player this Patch Tuesday [Read More]
Google’s Ian Beer releases iOS 11 exploit that can be used for jailbreaks to help security researchers analyze Apple devices [Read More]
Synopsys has completed its acquisition of Black Duck Software, a privately held company that offers automated solutions for securing and managing open source software. [Read More]
Menlo Security, a provider of malware isolation technology, has raised $40 million in a Series C funding round, bringing the total amount raised by the company to $85 million. [Read More]
Users can now check if systems have been targeted with an NSA hacking tool designed to remove traces of an attack, and even recover deleted logs [Read More]
macOS-targeting HiddenLotus backdoor is using an innovative technique to disguise the fact that it is an executable in order to avoid alerting users on its execution. [Read More]
A vulnerability in the Android (CVE-2017-13156) mobile OS could result in tampering with applications’ code without altering their signature. [Read More]
After getting complaints from developers, Google is evaluating whether it should continue allowing innovative use of accessibility services by Android apps [Read More]
Microsoft used the same certificate for all instances of its Dynamics 365 ERP product and it took more than 100 days to take action, but the company claims the issue posed little risk [Read More]
Synaptics touchpad driver present on hundreds of HP laptops includes keylogging functionality. Patches available for a majority of affected devices [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.