Security Experts:

Virus & Threats
long dotted


Researchers at Palo Alto Networks disrupted a cyberespionage campaign conducted by an Iranian threat actor [Read More]
Critical flaws affecting over two dozen Symantec and Norton products can be exploited for remote code execution [Read More]
A malicious photo and video stealing mobile application targeting Android users managed to trick the Google Bouncer protection system and slip into the Google Play. [Read More]
Researchers observed several hospital attacks where malicious actors disguised their sophisticated tools as old malware [Read More]
Facebook rushed to patch a serious vulnerability that could have been exploited to delete any video [Read More]
A vulnerability patched recently by PayPal could have been exploited by hackers to insert malicious images into payment pages [Read More]
Researchers found several flaws in Uber services that could have been exploited to obtain promo codes and information on drivers and passengers [Read More]
A hacker had accessed the video conferencing system of the Parti Libéral du Québec (PLQ) and eavesdropped on confidential meetings. [Read More]
WordPress 4.5.3 released. The latest version patches eight vulnerabilities and 17 bugs [Read More]
A total of 16 information leakage, DoS, directory traversal and buffer overflow vulnerabilities have been patched in the Pidgin chat client [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jim Ivers's picture
IoT promises a lot of convenience, but there is a price to be paid if you don’t involve the best connected device ever created—your brain.
Torsten George's picture
Google Dorking can be used to identify vulnerable systems and trace them to a specific place on the Internet.
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Wade Williamson's picture
Behavioral detection models can focus in on what the attacker actually does, instead of relying on a set of signatures or known indicators of compromise that often lag behind attackers.
Emily Ratliff's picture
Wendy Nather coined the term “security poverty line” to describe how organizations operate when they have insufficient investment in IT security.
Jim Ivers's picture
Software that protects the crown jewels of the organization and reduces risk translates to “valuable.”
Jim Ivers's picture
Developers are not trained in security and security is not yet an adequately integrated component of the development process. We are not applying good, or even minimal, security practices.
Emily Ratliff's picture
Writing yet another “security” paper isn’t going to do the trick. Security practitioners need to do a better job of getting our messages integrated into core developer documentation.
Simon Crosby's picture
Next-gen Anti-Virus can’t help any more than traditional AV, but the principle of least privilege, enforced through virtualization based security, can stop the breach before it starts.
Jim Ivers's picture
The Internet of Things (IoT) will result in billions of connected devices coming on line in the next ten years, and the associated software will be built by industries that traditionally have not emphasized software security.