Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

More than 4.7 million users could be exposed to potentially malicious ads and credential theft after cybercriminals managed to hijack the developer accounts of several popular Chrome extensions. [Read More]
Hackers possibly from China planted a backdoor in popular connectivity tools from NetSarang as part of a major supply chain attack [Read More]
Public cloud environments are the most secure, according to data collected over an 18-month period by Alert Logic [Read More]
Webroot buys security awareness training company Securecast to offer a security awareness platform to MSPs [Read More]
Cybercriminals combine Office exploits for CVE-2017-0199 and CVE-2012-0158 likely in an effort to avoid detection [Read More]
Security researchers have discovered a flaw in the Windows Object Linking and Embedding interface that allows hackers access using Microsoft PowerPoint to install malware. [Read More]
British researcher Marcus Hutchins pleads not guilty in US court to creating and selling the Kronos banking Trojan [Read More]
U.S. defense contractors targeted by North Korea-linked threat group known as Lazarus [Read More]
There are 4.1 million Windows endpoints online that would accept communication via the Remote Desktop Protocol (RDP) in one way or another, a recent report reveals. [Read More]
VMware patches hard-to-exploit DoS vulnerability in the NSX-V network virtualization solution [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.