Malwarebytes apologizes for jumping the the gun on WinRAR vulnerability

Researchers at Malwarebytes said the WinRAR product is not malicious after publishing a blog last week that it was vulnerable.

Report indicates Uber looking into Lyft employee as possible culprite in data breach

As Uber continues to investigate a data breach of its drivers database, Reuters came out with a report Thursday claiming that the car service app's primary suspect is also its main rival: Lyft.

IP Expo Europe: Smart equals exploitable, and VW is a threat actor

Mikko Hyppenon's presentation at IP Expo Europe, entitled Securing Our Future, described corporates as a new threat actor, and declared 'smart' anything another word for 'exploitable'.

Representatives pen letter asking for OPM to stop housing security clearance info

Representative Ted Lieu, D-Calif., and Rep. Steve Russell, R-Okla., wrote a letter to the Acting Deputy Director for Management David Mader and implored him to move security clearance data out of OPM.

Featured: Vulnerabilities

'Kemoge' adware infects users in more than 20 countries

Yet another adware campaign stemming from China has been identified, and in this fresh go, victims' Android device can be completely taken over.

October issue now available

Product Reviews

IntaForensics Lima Forensic Case Management

This should be in every digital forensic lab, especially those that need to track evidence for use in court.

Distil Networks

Distil inspects each http request in real time to determine if it is a malicious bot.

Guidance Software EnCase 7.10

EnCase has a long history in law enforcement and, in recent years, has moved strongly into the corporate world.


Opinions Are SYNful Knock-style router attacks set to become the new normal?

Are SYNful Knock-style router attacks set to become the new normal?

In the wake of the SYNful Knock attack on its routers, Cisco should re-engineer its devices to prevent future attacks, says Raimund Genes.

Opinions U.S. must improve data laws

U.S. must improve data laws

Can U.S. data protection laws protect privacy and preserve tech innovation and intellectual property?

Opinions Canada stands against spam

Canada stands against spam

The impact of Canada's anti-spam legislation for companies big and small.

Opinions Rethinking your IT leadership strategy

Rethinking your IT leadership strategy

Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.

Online exclusive

Emerging Products: Cloud Security, Part 2

In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.

Me and my job

CSOs: We'd like to profile one of your IT team members
This section gives you an opportunity to call out one of your star team members, whose picture and responses would appear in SC Magazine.

Click here for more information.

Sign up to our newsletters