Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Russian cyber-espionage group Fancy Bear (APT28) is the first threat actor to have used a Unified Extensible Firmware Interface (UEFI) rootkit in a malicious campaign, security researchers claim. [Read More]
NSS Labs claims that AMTSO has organized a conspiracy against the EPP product testing industry – and specifically NSS Labs – to prevent independent testing of EPP products. [Read More]
Rapid7 adds automation and orchestration capabilities to its Insight Platform, and new automation functionality to vulnerability management and incident response tools [Read More]
Windows machines that haven’t been patched against the National Security Agency-linked EternalBlue exploit are stuck in an endless loop of infection, security experts say. [Read More]
New privacy features in Apple’s Safari browser seek to make it tougher for companies such as Facebook to track you. [Read More]
One year after the BlueBorne flaws were disclosed, more than 2 billion devices are still vulnerable to attacks, either because users have failed to install patches or because no fixes are available [Read More]
The firmware running on nearly all modern computers has flaws that can be exploited to obtain potentially sensitive data from the device’s memory by using the old cold boot attack method [Read More]
macOS applications distributed via Apple’s official App Store marketplace are collecting and exfiltrating sensitive user data, security researchers warn. [Read More]
CrowdStrike has added its Falcon MalQuery malware search engine to the Hybrid Analysis service [Read More]
Code of DexGuard, software designed to secure Android applications and software development kits (SDKs), was removed from GitHub after being illegally posted on the platform. [Read More]

FEATURES, INSIGHTS // Endpoint Security

rss icon

Alan Wlasuk's picture
While our attention is immediately drawn to the Internet when we think about the benign-turned-evil Matrix, a more interesting comparison can be made to the current Internet plague of botnets.
Robert Vamosi's picture
Laptop batteries use microcontrollers to tell the lithium battery when it's full and when it needs to be recharged. What's intriguing is that cybercriminals could install malware that would remain on the device no matter how many times you reinstalled the operating system.
Andrew Jaquith's picture
As with most stories Mac-related, the malware-is-finally-coming story attracted a lot of press. But the desktop Mac OS might not be attractive to attackers as you might think.
Noa Bar-Yosef's picture
Are major data breach headlines helping consumers become more secure? Not necessarily. Many users still ignore security advisories, and our lackadaisical approach to security affects other consumers.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!
Ram Mohan's picture
Are your passwords safe? Three simple ways to create memorable yet secure passwords
Mike Lennon's picture
A new report from Palo Alto Networks examines user and application trends in the enterprise, covering 1,100 applications across 723 organizations, providing a fascinating glimpse into what’s happening within the networks of enterprises around the globe.
Alex Thurber's picture
Social Media Use Policy - The consumerization of IT is affecting all aspects of the way we work. As Web 2.0 technologies continue to gain popularity amongst employees, IT departments are struggling to understand and manage the challenges.
Markus Jakobsson's picture
Anti-virus products scan for malware in two ways. They look for sequences of bits that are found in programs that are known to be “evil” (but which are not commonly found in “good” programs)...