LATEST NEWS

Study shows how attackers make use of websites existing for less than 24 hours

Looking at the top 50 of parent domains that produced websites existing for less than 24 hours, researchers with Blue Coat Security Labs observed that 22 percent were malicious.

IBM projects 2014 bug disclosures may hit three-year low

The number of disclosed vulnerabilities is on track to fall below 8,000 this year, a first since 2011.

PlayStation Network downed by DDoS attack, other gaming networks hit too

Gamers were unable to use the PlayStation Network for most of Sunday due to a DDoS attack, and other gaming networks also suffered from similar problems throughout the weekend.

Focus: Threats

Product Reviews

Novell ZENworks Endpoint Security Management v11

starstarstarstarstar
Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.

Invincea Platform v3.3/4.0

starstarstarstar½
Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.

Data Breach Blog

OPINIONS

An IT lens on data breach response

This heightened awareness regarding data breach response time has created an interesting dynamic for security professionals.

Slideshow

Black Hat 2014 once again brought in some of the brightest minds in the information security field to showcase their skills. From discussions revolving around privacy, vulnerabilities, and state-sponsored malware, to educational training sessions, this year's event delivered plenty of fodder. Here's a look at the conference action. Photo Credit: Black Hat 2014

Outside Lens

On-the-go content


SC Magazine app

Download the SC Magazine app for iOS and Android!

The latest IT security news, analysis and features on your mobile or tablet

Click here to download »


Sign up to our newsletters

POLL