Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Cyber espionage group known as Bronze Butler and Tick, which researchers linked to China, continues to target Japan using custom malware and a zero-day [Read More]
Siemens patches two vulnerabilities, including one rated high severity, in building automation controllers [Read More]
41 Hyatt hotels in more than a dozen countries hit by payment card breach. This is the second breach discovered by the company within two years [Read More]
Websites of credit reporting agencies Equifax and TransUnion redirected users to malware, adware and scams due to a third-party web analytics script [Read More]
Increasing number of organizations moved to Office 365, but many haven’t migrated due to security concerns, including ransomware and phishing [Read More]
A vulnerability that that was recently addressed by Microsoft as part of the October 2017 Patch Tuesday could result in Outlook sending emails in cleartext when S/MIME encryption was supposed to be used. [Read More]
Equifax website that allows consumers to obtain their credit report was hacked and it redirected users to sites serving adware and scams [Read More]
High-Tech Bridge launches Mobile X-Ray, a free online service designed for testing native and hybrid iOS and Android apps [Read More]
Unpatched SQL injection vulnerabilities in BPC’s SmartVista payment platform can expose sensitive information [Read More]
Simple DirectMedia Layer (SDL), a library used for many games and video playback software, has two high severity flaws that can be exploited via malicious GIMP files [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”