Security Experts:

Virus & Threats
long dotted

NEWS & INDUSTRY UPDATES

Samba patches critical remote code execution vulnerability introduced in 2010. Over 100,000 Internet-exposed systems running vulnerable versions [Read More]
Samsung Electronics is investigating claims by a German hacking group that it fooled the iris recognition system of the new flagship Galaxy S8 device, the firm said. [Read More]
Several flaws, including ones rated critical, found in Rockwell Automation’s Allen-Bradley MicroLogix PLCs. Patches available only for some devices [Read More]
Trend Micro patches half a dozen vulnerabilities in its ServerProtect for Linux product [Read More]
Google researcher Tavis Ormandy releases tool for porting Windows DLLs to Linux to improve fuzzing - ports Windows Defender as demo [Read More]
A bug in the Twitter social network allowed an attacker to post tweets as a different user, without having access to the victim’s account. [Read More]
Attackers can remotely hijack millions of systems using malicious subtitle files and vulnerabilities in popular media players [Read More]
White hat hackers show how easy it is to bypass the iris recognition system on Samsung’s Galaxy S8 smartphones [Read More]
It takes SCADA vendors 150 days to patch vulnerabilities, and the industry is roughly at the same level as the cybersecurity sector [Read More]
Russian authorities dismantle cybercrime gang responsible for infecting 1 million Android phones with a banking Trojan and stealing nearly $900,000 [Read More]

FEATURES, INSIGHTS // Virus & Threats

rss icon

Jennifer Blatnik's picture
If the WannaCry incident taught us anything, it’s that global, widespread ransomware can and will impact organizations without any notice. The time to prepare is now.
Torsten George's picture
Hackers are exploiting known vulnerabilities and are betting on the fact that organizations don’t know how to fix what really matters.
Jim Ivers's picture
With the advent of connected devices, privacy and security have become tightly linked because theft of private data is often the goal of malicious attacks.
Jim Ivers's picture
If we agree that quality and security problems are both a form of defect, then we must sufficiently address both to produce software of the highest integrity.
Adam Meyer's picture
As with anything new, you need to prepare and plan for IoT devices being in your environment to maximize the value they provide, while minimizing the inherent risk of these network-enabled devices.
Dan Cornell's picture
Gaining an understanding of the tools that development teams use provides security teams with valuable insight into how developers work, how they make decisions, and the incentives that drive them.
Jim Ivers's picture
Enlightened toy manufacturers likely begin to embrace the basic concepts of IoT security and build connected toys that can be trusted by parents.
Jim Ivers's picture
Enabling developers through the right mix of tools and education just makes too much sense and generates too much value for all concerned.
Adam Meyer's picture
Cyber threat intelligence is showing us is that most threats simply exploit a series of well-documented vulnerabilities and other weak points to move along the path of least resistance – and the most profit.
Josh Lefkowitz's picture
Not adhering to responsible disclosure has the potential to amplify the threats posed by certain vulnerabilities and incidents.