Latest News

News

IoT assault, connected devices increasingly used for DDoS attacks

While the information stored in internet of thing (IoT) devices is still valuable, researchers spotted an increase in attacks targeting IoT devices.

News

Cybercriminals already able to hack ATM biometric readers

Even though biometric readers have not been rolled out on ATM's, cybercriminals have already developed tools to steal a person's fingerprint and other biological data.

News

Cities planning transparency laws for police surveillance tech

Eleven cities are organizing local legislation intended to make the procurement and use of surveillance technologies by local police departments more transparent.

News

Malware evades researchers' VM environments by looking up their Word doc history

One of the techniques malware can use to evade researchers' virtualized or sandbox environments is accessing recent documents to determine if the infected machine has a history of legitimate usage.

News

Cyber space wars may require new international regimes

While it might not include the Death Star cyber warfare among the stars is almost inevitable.

Data Breach Blog

324K Regpack users' info compromised when decrypted files placed on public-facing server

Independent Security Researcher Troy Hunt spotted a database containing the information of nearly 324,000 Regpack accounts.

Featured News

Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected

Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected

On the cusp of a $4.8 billion acquisition by Verizon, Yahoo today disclosed a data breach in which a state-sponsored actor is believed to have stolen a copy of data linked to at least 500 million accounts.

SC Spotlight Feature

Can one CISO ever beat an army of IoT devices?

Can one CISO ever beat an army of IoT devices?

The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.

September 2016 Product Reviews

News SC Magazine's September 2016 product reviews

SC Magazine's September 2016 product reviews

Well, we're well into summer and we've had a short break during our two-month combo edition for July and August so let's get back to it with one of our more active groups: data leak prevention (DLP) and endpoint security.

Opinions

Speak the board's language or get fired

Speak the board's language or get fired

A communication gap exists today between CISOs and the board of directors, says Feris Rifai, CEO, Bay Dynamics.

Government surveillance from Caesar to Nixon

Government surveillance from Caesar to Nixon

Government surveillance is, however, not new, says Patrick O'Kane, barrister and compliance counsel.

Director's Cut

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US