Security Experts:

More Security Headlines

Senators Edward J. Markey (D-Mass.) and Richard Blumenthal (D-Conn.) reintroduced two pieces of legislation that would implement and improve cybersecurity standards for cars and aircraft. [Read More]
Researchers discovered multiple serious vulnerabilities in popular solar park monitoring devices from Solar-Log [Read More]
Vulnerabilities found in the Chrome and Firefox extensions of the LastPass password manager allow attackers to steal passwords, execute code [Read More]
A security researcher took it to GitHub to disclose information on multiple vulnerabilities allegedly affecting Nest Cam and Dropcam Pro devices after receiving no response from Google for several months. [Read More]
A new malvertising campaign has been targeting popular adult websites with pop-under ads that ultimately directed users to the RIG exploit kit which sought to drop Ramnit malware. [Read More]
Check Point security researchers have warned that tactics employed by a mobile Trojan (Swearing Trojan) targeting users in China might become a worldwide threat when adopted by Western malware. [Read More]
Twitter said it suspended 376,890 accounts in the second half of 2016 for "promotion of terrorism," an increase of 60 percent over the prior six-month period. [Read More]
DoubleAgent is a new attack method that abuses a legitimate Microsoft tool to hijack security products [Read More]
Metasploit has released a new hardware bridge extension to help researchers and pentesters discover security flaws in IoT radio (RF) communications. [Read More]
Join F5 Networks and SecurityWeek for this interactive webinar to learn what good, actionable threat intelligence looks like, and how to effectively use it to neutralize potential attacks before they strike. [Read More]

SecurityWeek Experts

rss icon

Joshua Goldfarb's picture
Although attackers still use malicious code quite often, they have been relying less and less on it. So how do attackers manage to be so successful without using any malware at all?
Marc Solomon's picture
Companies can make their entire security infrastructure more effective by using this threat intelligence as the glue to integrate layers of point products within a defense-in-depth strategy.
Dan Cornell's picture
Gaining an understanding of the tools that development teams use provides security teams with valuable insight into how developers work, how they make decisions, and the incentives that drive them.
Ashley Arbuckle's picture
To develop a strong security posture while capturing digital value, transportation providers need to ask themselves some important questions.
Travis Greene's picture
If there are only five controls that a security organization can reasonably tackle this year, what should they be?
Torsten George's picture
Cyber security and cyber threats are most often confused with cyber risk, and often used interchangeably, but they are worlds apart.
Jack Danahy's picture
Identifying malicious software by recognizing that it just damaged the system or exfiltrated some amount of information is no longer defense, but detection.
Lance Cottrell's picture
In addition to basic credit monitoring, breached companies need to get ahead of the attacks and start providing security solutions that actually protect the victims before they are victimized again.
Avi Chesla's picture
Security analysts are collecting all events, but are struggling to filter out non-relevant signals in an attempt to isolate the important events from the rest of the noise.
Jim Ivers's picture
Enlightened toy manufacturers likely begin to embrace the basic concepts of IoT security and build connected toys that can be trusted by parents.