Security Experts:

More Security Headlines

Italian security researchers have discovered a vulnerability that can be easily exploited to break into messaging applications such as Telegram, WhatsApp, and Signal. [Read More]
Muddy Waters and MedSec have responded to St. Jude’s lawsuit. Their claims have been backed by an outside security consulting firm [Read More]
A high severity DoS vulnerability that was fixed in ISC BIND releases in May 2013 affects some Linux distributions [Read More]
The Russian national arrested by Czech police has been charged in the U.S. for allegedly hacking LinkedIn, Dropbox and Formspring [Read More]
The DDoS attacks on Dyn’s DNS service, which caused disruptions to several major websites, was powered by Mirai botnets [Read More]
Russia's foreign ministry on Sunday said an old version of its website had been attacked after a US hacker claimed he broke in and posted a mocking message. [Read More]
Free Voice-over-IP (VoIP) service Discord has had its servers abused to host and distribute remote access Trojans (RATs), Symantec warns. [Read More]
A newly observed Linux backdoor Trojan can perform its nefarious activities without root access, by using the privileges of the current user, Doctor Web security researchers have discovered. [Read More]
Researcher earns $9,000 for finding serious access control bypass vulnerabilities in Slack, including one that could have been used for account hijacking [Read More]
Twitter, GitHub and several other major websites are inaccessible for many users due to a DDoS attack on Dyn’s Managed DNS infrastructure [Read More]

SecurityWeek Experts

rss icon

Steven Grossman's picture
Beginning November 30, 2016, DoD third party contractors will be required to establish and maintain an insider threat program.
Wade Williamson's picture
Instead of the “Department of No”, security teams need to be recognized as the even keel that stays the course even when the rest of the organization gets distracted.
Ashley Arbuckle's picture
What it takes to operate security operation center (SOC) effectively has changed in this ever-evolving threat landscape, putting an even greater burden on analysts and the technologies they rely upon.
Marie Hattar's picture
Marie Hattar of Ixia looks at the growing armies of botnets, and how their tactics can be nullified using intelligent IP address filtering.
Lance Cottrell's picture
OODA loop is a well established concept often used in security which originated in the military. OODA stands for Observe, Orient, Decide, Act.
David Holmes's picture
Password proliferation is bad, for many, many, many reasons. But the worst reason is that people tend to re-use passwords all over the place.
Jim Ivers's picture
Mature organizations should adopt a blended approach that employs testing tools at various stages in the development life cycle.
Travis Greene's picture
Two-factor authentication (2FA) is becoming more mainstream for businesses; however, businesses need to consider how 2FA should be implemented to maintain both external and internal control.
Adam Meyer's picture
One key aspect of making threat intelligence practical is to ensure the intel is evaluated. What do I mean by this?
Rocky DeStefano's picture
Hadoop — with its ability to ingest, process and provide analytics for nearly untold amounts of data — is being adopted to solve many of the cybersecurity challenges we face.