May 2012 Issue of SCMagazine
Is health care a last frontier for today's cyber criminals?
News briefs: The latest news from Apple, Verizon, CrowdStrike, FTC and more
Personnel announcements, M&A activity and other company news
Threat of the month
Threat of the month: Chrome exploit
2 minutes on
While guidelines on the federal and state level aid in the overall security of e-voting machines, there is still potential for insider attacks in the ...
Skills in Demand
software developers with skills in collaboration software, databases and mobile device programming are needed.
Me and my job
Me and my job: Brian Wolfinger VP of electronic discovery & forensic services, LDiscovery
Debate: Identifying the culprits behind Koobface will diminish the gang's activity.
Many companies simply are unable to keep up with the evolving exploits, says M86 Security's Bradley Anstis.
Adopting PCI DSS is a sensible thing to do from a security perspective, says New Net Technologies' Mark Kedgley.
There is increasing pressure to make corporate resources available to users on any device.
Certifications have long validated security skills, says W. Hord Tipton of (ISC)2. But as the profession evolves and more educational opportunities pop up, how valuable ...
The decision to move to the cloud has always been wrought with anxiety over entrusting one's data to a third-party. Learning which questions to ask ...
For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of ...
Health care traditionally, compared with other industries, has lagged in terms of cyber defense, but with attackers now specifically targeting these organizations for patient data, ...
While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had ...
For the third year in a row, students in the computer forensic class of SC Magazine Technology Editor Peter Stephenson have produced this month's Group ...
Group Test 1
ADF Solutions Triage-Examiner is a forensic tool that scans target devices whether they are powered on or off. The product reduces forensic backlogs and dedicates ...
Cellebrite UFED Ultimate is a forensic tool for gathering information from portable devices, such as cell phones, tablets, PDAs, memory sticks, standalone GPS devices and ...
NetDetector Alpine v4.2 is the most up-to-date version of NIKSUN’s network traffic-monitoring hardware that audits and informs users of network security threats.
Paraben Device Seizure v4.6 is a software package that assists forensic investigators in the examination of mobile devices, allowing data acquisition of both logical and ...
RSA NetWitness is a network-monitoring system designed to handle a wide range of information.
Technology Pathways ProDiscover IR v18.104.22.168 aims to provide streamlined previews, imaging and analysis of live systems.
Once the kinks are worked out in initial setup, the equipment performs adequately, working according to the defined parameters.
The suite of computer forensic tools from AccessData Group that we tested is a nearly complete examiner’s tool kit.
The operating environment itself must be altered, says Verdasys' Dan Geer.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- U.S. government extends offer to protect states from electoral cyberthreats
- Cisco shedding 7% of its workforce
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought