LATEST NEWS

Researcher hacks network connected devices in own home

In his own home, a researcher was able to hack various network connected devices that are not computers and mobile phones.

Study: Most higher ed malware infections attributed to 'Flashback'

Flashback caused a stir in 2012 when some 650,000 Macs were infected with the malware.

Community Health Systems attackers exploited Heartbleed bug for access, firm says

Sources close to the breach investigation tipped off TrustedSec CEO David Kennedy.

Focus: Threats

Product Reviews

Novell ZENworks Endpoint Security Management v11

starstarstarstarstar
Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.

Invincea Platform v3.3/4.0

starstarstarstar½
Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.

Data Breach Blog

OPINIONS

An IT lens on data breach response

This heightened awareness regarding data breach response time has created an interesting dynamic for security professionals.

Slideshow

Black Hat 2014 once again brought in some of the brightest minds in the information security field to showcase their skills. From discussions revolving around privacy, vulnerabilities, and state-sponsored malware, to educational training sessions, this year's event delivered plenty of fodder. Here's a look at the conference action. Photo Credit: Black Hat 2014

Outside Lens

On-the-go content


SC Magazine app

Download the SC Magazine app for iOS and Android!

The latest IT security news, analysis and features on your mobile or tablet

Click here to download »


Sign up to our newsletters

POLL