Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Researchers uncovered three vulnerabilities in digital video recorder devices that can be used to execute code without authentication.
The creators of the jQuery Validation Plugin have fixed a vulnerability in a demo component that was first reported to them more than three years ago.
Britain's privacy watchdog called on Russia to take down a site showing hacked live feeds from thousands of homes and businesses around the world and warned it was planning "regulatory action".
A new variant of the Citadel Trojan is designed to capture keystrokes in an effort to obtain the passwords that protect access to authentications solutions and password managers.
The Federal Trade Commission and the state of Florida recently obtained a court order that temporarily shuts down what the agency says is a massive tech support scam.
Apple's first update for the iOS 8.1 mobile operating system includes bug fixes, increased stability and performance improvements for older devices, and also addresses several security issues.
The vulnerabilities exist in Advantech EKI-6340 V2.05, Advantech Web Access 7.2 and Advantech AdamView V4.3, according to Core Security.
With the release of the stable version of Chrome 39, Google has made several changes to improve stability and performance, but it has also addressed numerous vulnerabilities.
An integration feature that allows Parallels Desktop users to access Windows folders from Mac OS X operating systems can exploited for a guest-to-host virtual machine (VM) escape.
Researchers at Trend Micro have spotted a campaign in which attackers abuse advertising networks and the Flashpack exploit kit in an effort to distribute various pieces of malware.

FEATURES, INSIGHTS // Virus & Threats

rss icon

Scott Simkin's picture
As more organizations build applications other than Web and corporate email into the course of their business, adversaries are taking note and adjusting their tactics.
Torsten George's picture
It appears that 2014 will be remembered in the IT industry for several severe and wide-reaching server-side vulnerabilities. So what lessons can we learn from these vulnerabilities?
Marc Solomon's picture
Recent high-profile security breaches at major retailers stem from the fact that in-store networks and their components are evolving and spawning a range of attack vectors.
Torsten George's picture
To limit the risk of having drive-by malware attacks planted on their websites, organizations should monitor the payload of their different Internet properties, which for larger organizations can easily become a huge undertaking.
Fahmida Y. Rashid's picture
Opinions vary wildly among experts as to the potential impact of the Shellshock vulnerability. What is known—and agreed upon—at this point, is that Shellshock is a very serious vulnerability because it allows remote code execution and gives the attacker full access to the system.
Jason Polancich's picture
Businesses have more data on hand than they think. They key is crafting a plan to track it and combine it with data from outside their own walls against which the internal data can be analyzed.
Marc Solomon's picture
Malvertising underscores the need for an approach to security that addresses the full attack continuum. With ongoing visibility and control, and intelligent and continuous updates, security professionals can take action to stop the inevitable outbreak.
Torsten George's picture
When an organization is solely focused on strengthening its compliance posture to pass an audit, they primarily look at control failures and gaps and try to mitigate them.
Mark Hatton's picture
You need to identify your security shortcomings before someone else does. Simulate attacks and tests to associate known vulnerabilities, previous attack patterns, and security/network data to identify potential attack paths to your company’s most important data.
Scott Simkin's picture
While SSL decryption is necessary for maintaining network security, security admins need to establish strict rules about how they handle decrypted data.
view counter