Security Experts:

More Security Headlines

In a follow-up to a report earlier this year on the use of visual basic code in malicious documents, researchers at Sophos say the trend is continuing to gain momentum.
JPMorgan Chase, one of the largest banks in the United States, has confirmed that its systems were breached this summer.
The US military is building a new cyber defense corps that can be used to protect the nation and possibly for offensive purposes.
The Tinybanker/Tinba Trojan has expanded its target list to attack banks worldwide, according to Avast.
The 2014 ICS Cyber Security Conference will address real world problems and discuss actual ICS cyber incidents, many of which have never been told before.
Middle Eastern petrochemical organizations have been targeted in cyberattacks leveraging the notorious Citadel Trojan, according to researchers at IBM-owned Trusteer.
The Android Open Source Platform (AOSP) browser installed on Android 4.2.1 is vulnerable to Same Origin Policy (SOP) bypass.
Demands for data on Google users have gone up dramatically during the past five years.
Gartner believes that through 2015, over 75% of mobile applications will fail basic security tests.
WikiLeaks today released new information on FinFisher, and a list of countries that have acquired licenses for the controversial suite of IT surveillance software.

SecurityWeek Experts

rss icon

Adam Ely's picture
At the end of the day, the kill switch will not only decrease the amount of people mugged for their phones because there is little net value in the device itself, but it will also provide individuals with the means to wipe the device of personal information.
Joshua Goldfarb's picture
Although it may be tempting to envision a world where the analyst has been fully automated, this does not seem particularly reasonable.
Pat Calhoun's picture
Being connected is critical and all the elements of an organization’s security platform should work in concert together to provide adaptive security for the entire environment.
James McFarlin's picture
With risks to national and economic security increasing, other avenues of cyber defense are receiving attention. Improving resilience and the promising application of predictive analysis to the prevention of cyberattacks before they occur are two such areas
Rebecca Lawson's picture
There is a common misconception that in order to move to virtual security solutions, companies can, or should, replace physical security technologies they rely on to keep their networks safe today.
Travis Greene's picture
If you can’t interpret user activity with the context of identity and what is normal behavior, your organization may be living with a false sense of security, providing a significant window of opportunity for attackers.
Mark Hatton's picture
it’s hard to build continuity under inconsistent leadership. It’s also really hard to beat the hackers when the person responsible for keeping them at bay has less job security than an NFL coach with a losing record.
Danelle Au's picture
The recent iCloud attack brings up very important considerations on data security, not only for consumers, but for any enterprise that uses the cloud.
Jason Polancich's picture
Collecting just a small amount of info regularly and diligently for your supply chain can not only help you secure your back doors, but the front entrances too.
Adam Ely's picture
COPE is often an attractive model for organizations concerned about keeping mobile data secure but presents its own set of issues. So how does COPE stack up against BYOD?