Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Canada’s CSE spy agency releases the source code of a malware detection and analysis tool named Assemblyline [Read More]
Hackers breach Eltima website and use it to deliver macOS RAT Proton via a trojanized version of Elmedia Player [Read More]
Russia-linked cyber espionage group APT28 uses recently patched Flash Player zero-day to attack government organizations and aerospace companies [Read More]
Google is offering a bonus of $1,000 to researchers who find serious vulnerabilities in select Android apps present on Google Play [Read More]
Recently observed distribution campaigns featuring the Ursnif banking Trojan were using new malicious macro tactics for payload delivery [Read More]
BoundHook hooking method is invisible to Windows 10’s PatchGuard. The issue is not considered a vulnerability by Microsoft [Read More]
Newly discovered Android malware can add compromised devices to a botnet that could potentially launch distributed denial-of-service (DDoS) attacks [Read More]
New Magniber (Magnitude+Cerber) ransowmare delivered to users in South Korea via Magnitude exploit kit [Read More]
DHS orders all federal agencies to implement DMARC, but Agari says currently only 9% have fully implemented the system [Read More]
Security firm discloses several unpatched vulnerabilities affecting Linksys E-series wireless routers [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Markus Jakobsson's picture
If a particular product blocks 99% of all threats, that probably means that product fails to detect the most dangerous threat: targeted attacks.
Scott Simkin's picture
Just as there should be consistency across network, endpoint and cloud security, there should be the same consistency in identification, prevention, policy and enforcement of that policy for IoT security.
Alastair Paterson's picture
With greater awareness about POS system attacks, operations against third-party suppliers, and the vulnerabilities of public or semi-public Wi-Fi networks, companies can do a lot to mitigate risk and ensure safer journeys for travelers.
Jack Danahy's picture
Jack Danahy, co-founder and CTO of Barkly, attempts to clarify what is and what is not machine learning in endpoint security
Josh Lefkowitz's picture
Oil and gas is one of the critical infrastructure sectors that face greater risks and challenges when it comes to security
Jennifer Blatnik's picture
One of the crucial benefits of blockchain is its distributed capabilities, which mean there isn’t one centralized target to hack.
Jim Ivers's picture
Given the observation that consumers still seem oblivious to the risks and the lack of awareness about basic security hygiene, the education push will fall short.
David Holmes's picture
Security researchers found 26 vulnerabilities within ISP network devices that would have given them remote admin access to the majority of home networks in the United States.
David Holmes's picture
A manufacturer of a meter may have a different threat model involving the physical aspects of the device itself: device memory, firmware interface, ecosystem communications.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”