May 2012 Issue of SCMagazine
Is health care a last frontier for today's cyber criminals?
News briefs: The latest news from Apple, Verizon, CrowdStrike, FTC and more
Personnel announcements, M&A activity and other company news
Threat of the month
Threat of the month: Chrome exploit
2 minutes on
While guidelines on the federal and state level aid in the overall security of e-voting machines, there is still potential for insider attacks in the ...
Skills in Demand
software developers with skills in collaboration software, databases and mobile device programming are needed.
Me and my job
Me and my job: Brian Wolfinger VP of electronic discovery & forensic services, LDiscovery
Debate: Identifying the culprits behind Koobface will diminish the gang's activity.
Many companies simply are unable to keep up with the evolving exploits, says M86 Security's Bradley Anstis.
Adopting PCI DSS is a sensible thing to do from a security perspective, says New Net Technologies' Mark Kedgley.
There is increasing pressure to make corporate resources available to users on any device.
Certifications have long validated security skills, says W. Hord Tipton of (ISC)2. But as the profession evolves and more educational opportunities pop up, how valuable ...
The decision to move to the cloud has always been wrought with anxiety over entrusting one's data to a third-party. Learning which questions to ask ...
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of ...
Health care traditionally, compared with other industries, has lagged in terms of cyber defense, but with attackers now specifically targeting these organizations for patient data, ...
While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had ...
The operating environment itself must be altered, says Verdasys' Dan Geer.
For the third year in a row, students in the computer forensic class of SC Magazine Technology Editor Peter Stephenson have produced this month's Group ...
Group Test 1
ADF Solutions Triage-Examiner is a forensic tool that scans target devices whether they are powered on or off. The product reduces forensic backlogs and dedicates ...
Cellebrite UFED Ultimate is a forensic tool for gathering information from portable devices, such as cell phones, tablets, PDAs, memory sticks, standalone GPS devices and ...
NetDetector Alpine v4.2 is the most up-to-date version of NIKSUN’s network traffic-monitoring hardware that audits and informs users of network security threats.
Paraben Device Seizure v4.6 is a software package that assists forensic investigators in the examination of mobile devices, allowing data acquisition of both logical and ...
RSA NetWitness is a network-monitoring system designed to handle a wide range of information.
Technology Pathways ProDiscover IR v188.8.131.52 aims to provide streamlined previews, imaging and analysis of live systems.
Once the kinks are worked out in initial setup, the equipment performs adequately, working according to the defined parameters.
The suite of computer forensic tools from AccessData Group that we tested is a nearly complete examiner’s tool kit.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context