LATEST NEWS

Report: SQL injection a pervasive threat, behavioral analysis needed

Report: SQL injection a pervasive threat, behavioral analysis needed

Long lag times between detection and resolution and reliance on traditional methods impair an organization's ability to combat SQL injection attacks.

Galaxy S5 fingerprint scanner bypassed using old Apple Touch ID spoof

Galaxy S5 fingerprint scanner bypassed using old Apple Touch ID spoof

A fingerprint spoof created in September 2013 to bypass the Touch ID on the iPhone 5s was used to bypass the fingerprint scanner on the Samsung Galaxy S5, which was released on Friday.

Oracle fixes 104 flaws in quarterly update, addresses Heartbleed bug

Oracle fixes 104 flaws in quarterly update, addresses Heartbleed bug

Oracle's Critical Patch Update (CPU) plugged 37 holes in the popular Java browser plug-in.

Pentagon to triple its security workforce by 2016

Pentagon to triple its security workforce by 2016

Defense Secretary Chuck Hagel recently announced the recruitment efforts during a speech in Fort Meade, Md.

The Heartbleed bug works, and could be a scapegoat for older breaches

The Heartbleed bug works, and could be a scapegoat for older breaches

Researchers proved the Heartbleed bug was real in a challenge issued by CloudFlare to prove private keys can be stolen, right around the time companies are claiming they were breached because of the critical flaw.

LATEST FEATURES

DATA BREACH BLOG

Data on 55,000 VFW members impacted by attacker seeking military intel

About 55,000 VFW members may have personal information at risk after an attacker seeking military intelligence gained access to a VFW web server.

More than 1,400 medical records compromised in Texas breach

More than 1,400 medical records were compromised after unauthorized access was gained to the health records system used by a Texas cardiology clinic.

Breach impacts thousands in Bibb County that applied for gov't jobs

A website security breach resulted in a compromise of data - including Social Security numbers - for thousands who applied for government jobs in Bibb County.

NEWS TEAM BLOG

Thanks for the memories

Today marks my final day at SC Magazine after more than 7-1/2 years.

Car hackers' appearance on the 'Today' show was important because they were on the 'Today' show

Ideas are needed on ways to improve the public's perception of computer security hackers who have no malicious intentions.

New plan to stop leaks: Squeal on your cubicle mate who may or may not be a whistleblower

An investigative report shows the Obama administration's insider threat program is far more expansive, and troubling, than even critics had thought.

Sign up to our newsletters