Latest News

News

Forensics firm says iOS 10 skips certain security authentications

A Russian mobile forensics company says the iPhone's most recent operating system has weaker password protection for manual iTunes backups than earlier operating systems.

News

OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks

Fourteen flaws in the OpenSSL project have been patched, including a high-severity vulnerability that can be exploited to cause a denial-of-service (DoS) attack.

News

IoT assault, connected devices increasingly used for DDoS attacks

While the information stored in internet of thing (IoT) devices is still valuable, researchers spotted an increase in attacks targeting IoT devices.

News

Cities planning transparency laws for police surveillance tech

Eleven cities are organizing local legislation intended to make the procurement and use of surveillance technologies by local police departments more transparent.

News

Malware evades researchers' VM environments by looking up their Word doc history

One of the techniques malware can use to evade researchers' virtualized or sandbox environments is accessing recent documents to determine if the infected machine has a history of legitimate usage.

Data Breach Blog

324K Regpack users' info compromised when decrypted files placed on public-facing server

Independent Security Researcher Troy Hunt spotted a database containing the information of nearly 324,000 Regpack accounts.

Featured News

Cybercriminals already able to hack ATM biometric readers

Cybercriminals already able to hack ATM biometric readers

Even though biometric readers have not been rolled out on ATM's, cybercriminals have already developed tools to steal a person's fingerprint and other biological data.

SC Spotlight Feature

Can one CISO ever beat an army of IoT devices?

Can one CISO ever beat an army of IoT devices?

The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.

September 2016 Product Reviews

News SC Magazine's September 2016 product reviews

SC Magazine's September 2016 product reviews

Well, we're well into summer and we've had a short break during our two-month combo edition for July and August so let's get back to it with one of our more active groups: data leak prevention (DLP) and endpoint security.

Opinions

Speak the board's language or get fired

Speak the board's language or get fired

A communication gap exists today between CISOs and the board of directors, says Feris Rifai, CEO, Bay Dynamics.

Government surveillance from Caesar to Nixon

Government surveillance from Caesar to Nixon

Government surveillance is, however, not new, says Patrick O'Kane, barrister and compliance counsel.

Director's Cut

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US