Security Experts:

Virus & Threats
long dotted


Two spy hacker groups linked to Iran, OilRig and Greenbug, appear to have shared malware code [Read More]
Researchers have discovered multiple unpatched vulnerabilities in different radiation monitoring devices used in nuclear power plants. [Read More]
FireEye releases FLARE VM, a free Windows-based security distribution designed for malware analysis, incident response and penetration testing [Read More]
Several vulnerabilities affecting the Autonomic Networking code in Cisco’s IOS software disclosed at Black Hat before patches were released [Read More]
Microsoft announces Windows bug bounty program with payouts ranging between $500 and $250,000 [Read More]
Seattle-based IOActive has issued a critical security advisory detailing a physical and authentication bypass in the Diebold Opteva ATM. [Read More]
Several remote code execution and denial-of-service (DoS) vulnerabilities have been found and patched in FreeRDP [Read More]
Apple, Facebook, Google, Microsoft and Mozilla outline their plans for Flash now that Adobe officially announced its end of life [Read More]
A new Windows backdoor was apparently created by the same cybercriminals who used the SambaCry exploit to deliver a cryptocurrency miner [Read More]
Adobe on Tuesday said that it will kill its Adobe Flash Player and stop providing security updates by the end of 2020. [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”
Jim Ivers's picture
These recommendations will help your organization reduce risk and save real money on the cost of resolving defects. It is not often you get such a clear win-win scenario.
Dan Cornell's picture
Being able to properly defend applications requires organizations to first identify their attack surfaces before meaningful risk management can take place.
Marie Hattar's picture
When done successfully, continuous testing and training prevents bugs and performance issues from going out the door, while enabling developers to better spot problems in the future.
Jack Danahy's picture
It seems as though competing vendors spend more of their marketing dollars describing the insufficiency of existing solutions than they do explaining the added value that their new advancements bring.
Travis Greene's picture
To reduce exposure to malware, security teams need to learn the DevOps techniques that are being adopted across the rest of the IT organization.
Jim Ivers's picture
Medical devices are indeed vulnerable to attack, but the industry is waking up to the breadth of the problems, and several organizations are forming a vanguard to show the way forward.
Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.