Security Experts:

More Security Headlines

A new Terra Privacy product called Hacker Deterrent Pro uses dynamic whitelisting to block malware and phishing attacks [Read More]
Was North Korea behind the WannaCry ransomware epidemic that hit global computer networks earlier this month? [Read More]
Samba patches critical remote code execution vulnerability introduced in 2010. Over 100,000 Internet-exposed systems running vulnerable versions [Read More]
A newly observed Jaff variant continues to use Necurs and PDF files for infection, but moved away from the .jaff extension and the Locky-like ransom note. [Read More]
According to a survey, forty-seven percent of respondents "expect to be protected from cyber-attacks by either their company or third-party app developers." [Read More]
Samsung Electronics is investigating claims by a German hacking group that it fooled the iris recognition system of the new flagship Galaxy S8 device, the firm said. [Read More]
Former CIA director John Brennan said that he warned Russia last summer against meddling in the US presidential election but the Russians went ahead and did it, anyway. [Read More]
Retailer Target agrees to pay $18.5 million to 47 U.S. states as part of a settlement over the massive data breach suffered by the company in 2013 [Read More]
Vera's new Multi-Factor Authentication offering adds strong authentication to corporate data wherever it travels, and allows MFA to be limited to specified data. [Read More]
Qatar said Wednesday it had begun an inquiry into an unprecedented security breach by hackers who posted fake news stories attributed to its ruler on highly sensitive regional political issues. [Read More]

SecurityWeek Experts

rss icon

Travis Greene's picture
But choosing to become a black hat hacker is not without risk. If you’re a budding hacker, consider these downsides...
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Steven Grossman's picture
President Trump's cybersecurity executive order touches on activities that indirectly but significantly impact government agencies’ cyber risk posture.
Barak Perelman's picture
It’s a generally known fact that most Industrial Control System (ICS) environments were not built with cyber security in mind because they were designed before the cyber threat existed.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Lance Cottrell's picture
Investigating nefarious actors online can be dangerous, as the places hunters go are likely to be full of malware and people actively monitoring for outsiders.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Josh Lefkowitz's picture
Safeguarding critical assets, proactively addressing cyber and physical threats, and assessing and mitigating risk accurately and effectively requires comprehensive visibility into both the Deep and the Dark Web.
Scott Simkin's picture
When implemented in series, common malware analysis environments allow security teams to handle the vast majority of threats automatically, freeing up team resources to actively hunt more advanced threats.
Adam Meyer's picture
Different intelligence consumers in your organization create and consume varying levels of threat intel to take appropriate actions against identified risks.