Security Experts:

More Security Headlines

Smartsheet has patched an insecure direct object reference vulnerability that could have been exploited to hijack user accounts.
Charlie Miller and Chris Valasek, the researchers who recently demonstrated that Fiat Chrysler cars can be hacked remotely, hired by Uber.
A jihadist hacker who was killed this week in a US air strike in Syria was actively recruiting Islamic State sympathizers to carry out lone wolf attacks in the west, the Pentagon said Friday.
Six teenagers arrested in the UK for allegedly using the Lizard Squad’s LizardStresser DDoS service.
A US appeals court on Friday overturned a ruling that the National Security Agency's bulk collection of phone records was illegal, saying the plaintiffs failed to show they were victims.
The chief executive of dating for adulterers website Ashley Madison stepped down on Friday after hackers leaked its membership list online.
Moxa has released firmware updates to address several vulnerabilities in EDS industrial ethernet switches.
BitTorrent has addressed the vulnerability that could have been exploited to launch DRDoS attacks.
Mozilla has updated Firefox 40 to patch a couple of critical and high severity vulnerabilities.
Adobe patches XXE vulnerability in ColdFusion. The flaw exists in the BlazeDS component and it can lead to information disclosure.

SecurityWeek Experts

rss icon

Wade Williamson's picture
In security circles, 2014 was known colloquially as “the year of the breach.” However, 2015 almost doubled the 2014 tally of breached records, and has done so in the first eight months.
Marc Solomon's picture
How do we handle the responsibility that cloud computing brings? It’s a responsibility that must be shared among vendors, users, business leaders, and IT security professionals and involves three key aspects.
Joshua Goldfarb's picture
The way in which we as a security community seem to be approaching the topic of information sharing seems backward to me.
Alan Cohen's picture
If vaults deep within the building protect banks from bank robbers, why do so many security professionals focus so much attention on their data center’s front door?
Rafal Los's picture
Security people who jump into troubled security organizations to help right the ship put their careers on the line and personal aspirations on hold, and their families take a temporary back seat.
Nate Kube's picture
Critical services we rely on are increasingly dependent upon cyberphysical interactivity. The scope of these critical services continues to broaden and deepen across industries, especially as the functionality and speed of devices is more widely understood.
Jason Polancich's picture
While most businesses feel they should be pursuing more robust cyber intelligence functions, most aren’t actually doing anything about it at all.
Travis Greene's picture
As much fun as it is to wake up to patches waiting to be unwrapped, we don’t want the regret of “exploit Wednesday”, which is far more embarrassing than becoming a victim of a zero-day exploit.
Joshua Goldfarb's picture
Detection is a philosophy, approach, and methodology that seeks to identify suspicious or malicious behaviors matching risks and threats the organization is concerned about.
Marc Solomon's picture
Accepting the reality that some attacks will get through, security effectiveness must be measured by how quickly we detect a compromise and stop the exploitation of that attack.