Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

UK’s Bristol Airport was forced to resort to whiteboards and markers after a piece of ransomware disrupted its flight information display system [Read More]
Google’s Android team finds high severity privilege escalation vulnerability in Honeywell’s Android-based handheld computers [Read More]
New privacy features in Apple’s Safari browser seek to make it tougher for companies such as Facebook to track you. [Read More]
One year after the BlueBorne flaws were disclosed, more than 2 billion devices are still vulnerable to attacks, either because users have failed to install patches or because no fixes are available [Read More]
The firmware running on nearly all modern computers has flaws that can be exploited to obtain potentially sensitive data from the device’s memory by using the old cold boot attack method [Read More]
Several serious arbitrary code execution flaws found in Fuji Electric V-Server, a tool that links the HMIs on the plant floor with PCs on the corporate network [Read More]
Address bar spoofing vulnerabilities have been found in Microsoft Edge and Apple Safari web browsers, but only the former has released a patch [Read More]
Microsoft patches over 60 flaws, including a Windows privilege escalation zero-day vulnerability disclosed by a researcher via Twitter [Read More]
SAP released its September 2018 set of patches to address a total of 14 vulnerabilities in its products, including a critical bug in SAP Business Client. [Read More]
Adobe patches a total of 10 vulnerabilities in Flash Player and ColdFusion, but none of the flaws appear too serious [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Ashley Arbuckle's picture
By understanding and easing the cultural shift this entails, you can save time and money and sleep better at night with security occupying a seat at the DevOps table.
Travis Greene's picture
As DevOps and agile development methodologies take greater root in the enterprise, the traditional tools and approaches for eliminating vulnerabilities in code will no longer be able to keep pace.
Dan Cornell's picture
When planning a testing strategy for an application, it is important to evaluate the applicability and likely effectiveness of the various testing approach options.
David Holmes's picture
Several tech vendors have been added to the list of vendors vulnerable to a variation on the Bleichenbacher attack called the ROBOT attack.
Lance Cottrell's picture
Laws to support swift and automatic updates for all devices, and consequence to organizations that fail to ensure their IoT devices are secure, would be a big step forward for IoT security.
Jim Ivers's picture
With a software composition analysis (SCA) tool in place, security teams can quickly scan an information repository and know where vulnerable software is being used.
David Holmes's picture
The "Reaper" IoT botnet is holding itself up as a blinky light in front of our faces, reminding the InfoSec community that we really need to get ahead of IoT madness.
Jack Danahy's picture
With all of our collective focus on machine learning, we simply can’t overlook human learning’s critical role in guarding against attack and protecting the organization.
Torsten George's picture
We need to consider whether traditional approaches to vulnerability management are still viable and if just upgrading existing methods or tools is sufficient.
Jalal Bouhdada's picture
Vendors, practitioners and security experts must all work closely together to combat the well-funded actors who pose a threat to medical devices.