Security Experts:

Virus & Threats
long dotted


IOActive researchers show how a remote attacker can hack an industrial collaborative robot, or cobot [Read More]
Compared to Mirai, which abuses many small devices for powerful DDoS attacks, Pbot can generate 75 Gbps from just 400 nodes, Akamai reports [Read More]
Neptune exploit kit, also known as Terror, Blaze and Eris, used to deliver Monero miner via malvertising campaign [Read More]
Fuze patches several vulnerabilities discovered by Rapid7 in its online customer portal, including authentication, access control and data transmission issues [Read More]
Elon Musk and over 100 robotics and AI entrepreneurs demand global ban on killer robots [Read More]
High severity remote code execution vulnerability found in Windows versions of Unity Editor. Game engine developers release patches [Read More]
A piece of code linked to both the UK researcher Marcus Hutchins (aka MalwareTech) and the Kronos malware was first published in 2009 [Read More]
CLKscrew - design flaws in energy management systems expose devices to remote attacks [Read More]
Russia-linked Turla cyberspies use new dropper to deliver JavaScript backdoor in attacks aimed at entities interested in G20 [Read More]
Hackers can use replacement touchscreens to take complete control of smartphones and tablets, researchers warn [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.