Security Experts:

More Security Headlines

Russia-based dating website Topface says it’s investigating reports that the details of 20 million users have been stolen by hackers.
Adobe updated Flash Player over the weekend to fix the second zero-day vulnerability (CVE-2015-0311) reported last week. The patch was released ahead of schedule.
The Malaysia Airlines website was defaced by hackers who referenced the Islamic State jihadists and claimed to be from the "Lizard Squad".
Elites at the World Economic Forum in Davos were warned Saturday of the terrifying possibilities of modern cyber terrorism.
US spies intercepted communications between the chief suspects in the murder case of Russian former spy Alexander Litvinenko, linking his poisoning to the Russian state, Britain's Daily Telegraph reported Saturday.
Researchers have discovered that the automatic tank gauges (ATGs) at 5,300 gas stations in the United States are vulnerable to hacker attacks.
The details of three high-severity vulnerabilities affecting Apple’s OS X operating system have been disclosed over the past two days by Google.
Security alerts can be highly useful in protecting an organization against a data breach, but inefficient alert management can have serious consequences, a new report shows.
Malware developers have used the source code of the remote access tool (RAT) Njw0rm to create two new RATs, researchers at Trend Micro reported on Thursday.
Adobe Systems issued a security advisory late Thursday, stating that it expects to have a patch available for a critical vulnerability (CVE-2015-0311) in its Flash Player during the week of January 26.

SecurityWeek Experts

rss icon

Rebecca Lawson's picture
As we enter the New Year, it’s time to reflect on these latest occurrences and consider what they may lead to in the year that lies ahead.
Nate Kube's picture
There are interesting lessons learned from IT IPS experiences that OT can benefit from. The first is to understand how attackers have bypassed traditional IPS IT solutions.
Scott Gainey's picture
Several financial analyst firms concluded extensive studies, surveying over a thousand CIOs and CSOs cumulatively, to gain a better understanding of how these breaches are impacting spending behaviors.
James McFarlin's picture
The overall industry tone of caution around active defenses may be calibrated to defuse the notion rather than taking the argument, buying time for other alternatives to surface.
Pat Calhoun's picture
Cybercriminals are getting increasingly sophisticated in their efforts to outsmart security defenses such as sandboxing. Here is a quick look at techniques used by attackers to evade sandbox detection.
Torsten George's picture
With cyber criminals increasingly targeting third-party vendors to gain backdoor access to data at large, well-protected global organizations, security professionals need to rethink their vendor risk management practices.
Danelle Au's picture
A data breach plan lays out the key steps and the key personnel to involve when a data breach happens, and needs to incorporate three elements.
Joshua Goldfarb's picture
At a high level, "big data" and "security analytics" are about the two very different, somewhat diametrically opposed, but equally important concepts of collection and analysis.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Jason Polancich's picture
Most businesses today cannot say with any certainty how the cybersecurity tools or people they acquire and use align with their specific cyber problems.