A long-overdue change
In his own home, a researcher was able to hack various network connected devices that are not computers and mobile phones.
This month's threat stats look into U.S. and international hackers' attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.
Advocacy groups and independent media face a variety of damaging cyberattacks, and there is little they can do to stop them, a new study from Harvard University concludes.