LATEST NEWS

Amplification, reflection DDoS attacks increase 35 percent in Q1 2014

The Q1 2014 Global DDoS Attack Report reveals that amplification and reflection distributed denial-of-service attacks are on the rise.

Attackers target Facebook to deliver Android iBanking malware

A Windows trojan delivered via drive-by download is injecting malicious content into Facebook and ultimately fooling users into downloading Android malware that can allow for the capturing of SMS messages.

Federal watchdog says SEC security issues put financial data at risk

According to the U.S. Government Accountability Office (GAO), SEC, among other lapses, failed to adequately oversee a contractor, which migrated its financial system to a new data center.

Focus: Vulnerabilities

Product Reviews

CorreLog Enterprise Server v5.4.0

starstarstarstarstar
System administrators looking to extend their logging capabilities, or security professionals needing to gain deeper insights into their computing environments, might start their search with the CorreLog Enterprise Server.

LogRhythm v6.2

starstarstarstarstar
Combining SIEM, log management, file integrity monitoring and analytics with powerful forensic tools, LogRhythm v6.2 offers security professionals a powerful monitoring and auditing platform to keep them informed, and an excellent investigatory tool in case things go wrong.

HP ArcSight ESM v6.5c

starstarstarstarstar
HP’s ArcSight ESM is a mature product that collects events from virtually any source.

Data Breach Blog

OPINIONS

The cool factor: New tech in banking has an edge

Disruption is expected; financial crime should be, too.

It's not the breach that kills you, it's the cover-up

It's how you handle yourself during and after a breach that will determine just how detrimental the breach actually is for your organization.

Slideshow

Bloomberg reported on Friday that the National Security Agency (NSA) was aware of the SSL/TLS encryption-breaking Heartbleed bug for at least two years before the now infamous flaw caught the attention of the world earlier this week. Shortly after, on its public affairs Twitter account, the NSA said it was not aware of the vulnerability until it was made public.

Outside Lens

On-the-go content


SC Magazine app

Download the SC Magazine app for iOS and Android!

The latest IT security news, analysis and features on your mobile or tablet

Click here to download »


Sign up to our newsletters

POLL