Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

PluginPhantom is a new Android Trojan that abuses the DroidPlugin plugin framework to evade static detection. [Read More]
Firefox zero-day vulnerability actively exploited in attacks aimed at Tor users. Mozilla is working on a patch [Read More]
During the more frequent feature updates in Windows 10, pressing SHIFT+F10 gives the user admin privileges while BitLocker is disabled. [Read More]
Cisco has decided to give vendors 90 days to patch the vulnerabilities discovered by its Talos researchers before disclosing their details [Read More]
German ISP Deutsche Telekom confirms that nearly 1 million customers suffered disruptions due to malware attacks on routers [Read More]
Mirai-based malware uses a recently disclosed attack vector to hijack Internet gateway devices [Read More]
While packed with a load of new security features, Window 10 doesn’t offer some of the additional protections that Microsoft’s Enhanced Mitigation Experience Toolkit (EMET) brings, CERT vulnerability analyst Will Dormann warns. [Read More]
Researcher discovers several enumeration vulnerabilities in Uber’s recently launched UberCENTRAL service [Read More]
Hackers can spy on people by using malware to turn their headphones into microphones, researchers warned [Read More]
VMware has patched information disclosure vulnerabilities in its vCenter Server, vSphere Client, vRealize Automation and Identity Manager products [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Torsten George's picture
Faced with hundreds, thousands, and even hundreds of thousands of vulnerabilities across their IT infrastructures leaves security practitioners at a virtually insurmountable disadvantage.
Jim Ivers's picture
As with any business relationship, you should use software or open source components from your allies with your eyes open to the potential risks.
Erin O’Malley's picture
What’s worse than having to cook a Thanksgiving turkey? How about being forced to relegate the poor bird to a crock pot after discovering that your net-connected oven and wireless meat thermometer have both been hacked?
Alastair Paterson's picture
Understanding what makes a good exploit kit is the first step in protecting against such attacks. But what else can you do to prevent adversaries from using exploit kits against your organization?
Jennifer Blatnik's picture
The interests of the researchers should be to make the world more secure, not profit from a corporation’s vulnerabilities.
Scott Gainey's picture
There’s a difference between “nice-to-have” security products and “must-have” security products. The “must-haves” are critical to protecting organizations from cyber attacks.
Jim Ivers's picture
I know I no longer have much trust in the connected devices in my home, and wonder what they do with their spare time.
Travis Greene's picture
A reliance on Internet voting with current technology will lead to the disenfranchisement of voters and manipulation by foreign or domestic attackers.
Jim Ivers's picture
Mature organizations should adopt a blended approach that employs testing tools at various stages in the development life cycle.
Scott Simkin's picture
While exploit kits are certainly contributing to the steady rise in the number of cyberattacks, in the end, the methods they use to infect endpoints and networks can be stopped provided the proper steps are taken.