Security Experts:

Virus & Threats
long dotted


GitHub has rewarded researchers nearly $100,000 since the launch of its bug bounty program two years ago [Read More]
Oracle has patched a high severity vulnerability in Java that can be exploited for arbitrary code execution [Read More]
The developers of the Neutrino exploit kit have added a passive OS fingerprinting feature to reduce exposure to analysis attempts [Read More]
In its 2015 Global Threat Report, security researchers at CrowdStrike examine the main trends in the threat landscape in 2015, including the evolution of Trojans, ransomware, phishing emails, and other threats. [Read More]
Google researcher Tavis Ormandy found a vulnerability in Avast SafeZone that allowed attackers to read any file on the system [Read More]
Dell announced the availability of a new enterprise endpoint security solution that now features post-boot BIOS verification, along with integrated threat protection technology powered by Cylance. [Read More]
EMET 5.5 was released with improved configuration of various mitigations via Group Policy Object (GPO) and various EAF/EAF+ pseudo-mitigation performance improvements. [Read More]
Google researcher Tavis Ormandy has warned that Comodo’s Chrome-based web browser Chromodo disables all web security [Read More]
Researchers have found a vulnerability in eBay that can be exploited for phishing and malware attacks, but the e-commerce giant believes the risk is low [Read More]
WordPress 4.4.2 patches open redirect and SSRF vulnerabilities, along with 17 functionality bugs [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jim Ivers's picture
Experienced organizations learn that security is not a drag on performance, but can provide productivity gains by eliminating security vulnerabilities early in the development process.
Simon Crosby's picture
While flexibility offers countless benefits for corporations and their employees, this new emphasis on mobility has also introduced a new set of risks, and this in turn re-ignites a focus on endpoint security.
Jim Ivers's picture
Hackers are creative by nature, so you have to use your imagination to think like one. Once you can see your organization from a hacker’s point-of-view, you will be equipped to defend your organization like a security pro.
Scott Gainey's picture
To replace antivirus, consider alternatives that integrate prediction, prevention, detection and remediation to protect against advanced threats that employ a wide variety of attack vectors.
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
Simon Crosby's picture
We owe the richness of today’s Web to the micro-payment model of online advertising, and it is difficult to imagine an alternative. But there are consequences for anyone who uses the Internet, although they may not realize it.
Jim Ivers's picture
Security must be built into IoT devices and systems just like any other application. Security practices must be followed.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Travis Greene's picture
Yahoo's “Account Key” uses push notifications to their Yahoo Mail app on mobile devices. Will this securely replace passwords and two-factor authentication?
Torsten George's picture
IoT opens up companies all over the world to more security threats, and only time will tell if the IoT vendor community can come together to create a common security framework that helps shrink the security risk iceberg and minimize the risk of cyber-attacks.