Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Intel Core processors affected by LazyFP vulnerability similar to Meltdown. Patches being developed, but many systems already not impacted [Read More]
New Android banking Trojan named MysteryBot, which researchers linked to LokiBot, leverages some interesting techniques for phishing and logging keystrokes [Read More]
Cybercriminals continue to add new exploits, including for vulnerabilities that recently had a zero-day status, to exploit kits [Read More]
China-linked cyber espionage group known as LuckyMouse, Emissary Panda and APT27 targets national data center in Central Asia, likely in an effort to conduct watering hole attacks on government sites [Read More]
Google this week detailed plans to completely remove the inline installation of Chrome extensions from its web browser by the end of the year [Read More]
Of the 10 Security Notes in SAP’s June 2018 Security Patch Day, 5 were updates for previously released Security Notes, including 2 rated critical [Read More]
Updates released by Microsoft for Windows enable a feature that should prevent attacks involving the recently disclosed Variant 4 of the Spectre/Meltdown flaws [Read More]
Microsoft patches 50 vulnerabilities with June 2018 Patch Tuesday updates, including 11 critical remote code execution flaws affecting Windows and web browsers [Read More]
Cryptocurrency miner malware PyRoMineIoT uses NSA-linked exploit to spread and leverages infected machines to scan for vulnerable IoT devices [Read More]
The popularity of cryptocurrency mining malware has been skyrocketing over the past year, and the segment appears to have been highly lucrative for cybercriminals [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.