Security Experts:

More Security Headlines

The details of nearly 5 million parents and over 200,000 children were stolen from the systems of Chinese educational toy manufacturer VTech
Vulnerabilities in OutdoorLink’s SmartLink app could have allowed hackers to remotely control billboard lights.
LinkedIn has patched a clickjacking vulnerability that could have been exploited via CSS classes.
Zen Cart patches critical vulnerability that can be exploited to execute arbitrary code and gain access to the vulnerable site’s database
Cisco has published a list of products that expose users to MitM attacks due to the reuse of certificates and keys
A port forwarding issue dubbed the “Port Fail” vulnerability can be used by attackers to obtain the real IP addresses of VPN users.
The CryptoWall 4.0 ransomware is being spread via exploit kits, with the Nuclear exploit kit (EK) being the first major crimekit to infect machines with this type of malware, Rackspace security researcher Brad Duncan has discovered.
LANDESK hacked. Attackers might have stolen employee personal information and even source code
Online retailer Amazon is sending emails to some of its customers, prompting them to reset their passwords, saying that they might have been compromised.
The infamous Dridex banking Trojan recently surfaced again in spam campaign runs that have managed to achieve a high infection rate, security companies are warning.

SecurityWeek Experts

rss icon

Wade Williamson's picture
Although ransomware is commonly targeted at consumers, recent versions have targeted the enterprise with a vengeance. This has shifted ransomware from a nuisance to a potentially debilitating attack that can freeze critical assets and intellectual property.
Joshua Goldfarb's picture
Organizations continue to suffer from alert fatigue, making it difficult to make informed decisions in a timely manner. A narrative-driven model provides an adequate framework to support timely, actionable, and informed decisions.
Alastair Paterson's picture
Cyber Threat Intelligence (CTI) is critical for organizations that want to gain a comprehensive, tailored and relevant view of the potential threats and types of attackers that could be targeting them.
Marc Solomon's picture
The Internet of Everything is transforming our world and creating more opportunities for attackers as modern networks and their components constantly evolve and spawn new attack vectors.
Travis Greene's picture
The challenge in Information Security is recognizing how biases affect our judgment in evaluating and responding to threats and taking steps to mitigate them.
Danelle Au's picture
Attackers are thinking outside the box, using sophisticated breach methods and taking advantage of a very collaborative ecosystem. Perhaps it’s time to supplement all our security defenses with a hacker-centric security paradigm.
Simon Crosby's picture
While data breaches aren’t going away anytime soon, every company has a choice of how they prepare for them. By focusing on the endpoint, businesses can better secure themselves with less cost and less time expended by the IT team.
Jay Schulman's picture
The ability to recruit the right person for an application security role who can also find the flaws is a struggle for many organizations. These job openings rarely get filled.
David Holmes's picture
Ron Rivest, the inventor of RC4, has improved the RC4 algorithm by adding a third index variable k and moving i through the array more quickly. This new, improved RC4 is called Spritz.
Torsten George's picture
The DHS initiated the Continuous Diagnostics and Mitigation program to safeguard and secure Federal Information Technology networks. But can the DHS CDM program really strengthen the security posture of government networks?