April 2013 Issue

Editorial

Sidestepping the humdrum

Threat of the month

Threat of the month: Universal Plug and Play vulnerabilities

Subscribe
Archive April 2013

  • SC Magazine Facebook
  • SC Magazine Twitter
  • SC Magazine LinkedIn
  • SC Magazine Google Plus
Subscribe Advertising
Archive
Login | Register
SC Magazine

WordPress tightens security with two-factor authentication

Slideshow: April 2013 threat stats

eSymposium: Mobile security April 11, 2013

SC Editions
  • SC US
  • SC UK
  • SC AUS/NZ
  • News
    • News Bytes
    • Features
    • Opinions
    • Canada
  • Products
    • Group Tests
    • First Looks
    • Emerging Products
    • Product Index
    • About Reviews
  • Blogs
    • The News Team Blog
    • The Data Breach Blog
    • The SC Awards Finalist Blog
  • Resources
    • Mobile App
    • Case Studies
    • ebooks
    • Podcasts
    • Slideshows
    • Spotlights
    • Newsletters
  • Videos
    • Director's Cut
    • InFocus
    • Outside Lens
  • SC MarketScope
  • Whitepapers
  • Events
    • Virtual Events
    • Editorial Webcasts
    • Vendor Webcasts
    • SC Awards U.S.
    • SC Congress Toronto
    • SC Congress New York
    • SC Congress Chicago
  • SC Magazine >
  • News >
  • Black Hat 2012
Sponsored Links

SC Magazine Articles

  • Popular
  • Emailed
  • Recent
  • Sophos' flagship web security product open to attack
  • Malware tries to invade technology companies once every 60 seconds
  • White House says new Chinese IT equipment rule may disrupt business without helping security
  • Medical records of 2k patients left unprotected on contractor's server
  • April's Patch Tuesday from Microsoft includes another Internet Explorer patch
  • Doctor's stolen laptop found at pawn shop; data of 652 patients exposed
  • Beyond BYOD
  • Apple releases two-factor authentication
  • Study finds iOS apps to be riskier than Android
  • Lost, unencrypted USB thumb drive impacts more than 50k Medicaid providers
  • Three LulzSec members plead guilty in London
  • Microsoft fixes three "critical" flaws with Patch Tuesday release
  • White House says new Chinese IT equipment rule may disrupt business without helping security
  • Laptop stolen from S.C. medical center contains data on 7k veterans
  • Court says Hannaford breach lawsuit doesn't meet standards of class-action

Check out what's trending

  • Hacktivism
  • Crime
  • Malware
  • Breaches
  • Threats
  • Government
  • Vulnerabilities
  • Espionage
  • Mobile
Return To Top

SC Magazine arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face and establish risk management and compliance postures that underpin overall business strategies.

  • Facebook
  • Twitter
  • LinkedIn
  • G+
  • RSS

Resources

  • Subscribe
  • Reprints
  • Issue Archive
  • Permissions
  • Sitemap
  • OBA Ad ChoicesAd Choices

User Center

  • About Us
  • Contact Us
  • Advertise
  • Editorial
  • Team
  • Advisory Board

OTHER SC MAGAZINE WEBSITES

  • SC Marketscope
  • SC UK
  • SC Australia
Copyright © 2013 Haymarket Media, Inc. All Rights Reserved
This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization.
Your use of this website constitutes acceptance of Haymarket Media's Privacy Policy and Terms & Conditions.