Security Experts:

Virus & Threats
long dotted


Adobe patches critical arbitrary code execution vulnerabilities in Dreamweaver and Flash Player [Read More]
Microsoft patches 75 vulnerabilities with March 2018 Patch Tuesday updates, including over a dozen critical flaws affecting its web browsers [Read More]
CTS said the newly discovered flaws could compromise AMD's new chips that handle applications in the enterprise, industrial and aerospace sectors, as well as consumer products. [Read More]
Researcher discovered Facebook vulnerabilities that exposed users’ friend lists and partial payment card information. One of the flaws was patched in 4 hours [Read More]
Multiple critical vulnerabilities impacting SecurEnvoy SecurMail could result in an attacker being able to read encrypted emails and even delete or overwrite messages in a user’s inbox. [Read More]
Malware can stealthily steal data from air-gapped computers using headphones and speakers, researchers demonstrate [Read More]
New samples of Hacking Team’s Remote Control System (RCS) flagship spyware have recently emerged, slightly different from previously observed variations, ESET warns. [Read More]
Kaspersky researchers find over a dozen vulnerabilities, including serious flaws that can be exploited remotely, in SmartCam cameras from Hanwha [Read More]
A China-linked cyber espionage group used new backdoors in an attack aimed at a company that provides services to the UK government [Read More]
Cisco has released software updates to address a hard-coded password vulnerability in Cisco Prime Collaboration Provisioning (PCP) Software. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.
Jim Ivers's picture
Why are even the most security-conscious organizations being compromised, and what does it mean for everyone else?
David Holmes's picture
DUHK and ROCA are both implementation-specific vulnerabilities concerning one of my favorite topics, random number generators.
Torsten George's picture
The end user community is at the mercy of security researchers to act responsibly in order to limit the potential for their findings to be used for malicious purposes.
Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security