April 01, 2013
How can it be that firms can feel confident in their security technology investments and their people, yet ultimately still believe that they remain at great risk?
Of the companies polled in a recent survey, eight in 10 indicated that they experienced web attacks in 2012.
March 27, 2013
As the debate on the usefulness of anti-virus continues, recent research reveals that a majority of malware is delivered via web browsing, skirting AV along the way.
Steve Durbin, global vice president for the Information Security Forum, discusses some of the problems security professionals face today.
Known for distributing postal-themed spam, the Asprox botnet has remained effective, though less noticeable due to evasion techniques.
February 27, 2013
We can prepare for whatever is over the horizon by enhancing our security architectures to prioritize our most important assets, while accounting for the changing attack vectors threatening them.
Robust growth in the information security profession is a sign of economic health in the overall economy, according to a new report from (ISC)2. And personnel skilled in emerging technologies and security as a business will be the ones who excel.
Cyber criminals are repurposing data-stealing trojans, once used primarily to steal banking information, to collect intellectual property, which can be sold for a higher price tag, according to a McAfee study.
Attackers primarily want cardholder data, which can be easily bought and sold underground to commit fraud, according to security firm Trustwave.
In the PC world, attackers prefer to compromise legitimate sites to spread malware. But in the realm of mobile, pornographic sites are the preferred launching pad for viruses.
Behind the rallying cry, "Privacy equals freedom," Ontario's Information and Privacy Commissioner Ann Cavoukian struck a partnership with Oracle to celebrate International Privacy Day: Jan. 28.
A young, Montreal-based computer science student, his former college and the institution's IT provider all found themselves thrust into the media spotlight over the student's stance on ethical hacking.
February 01, 2013
The secret behind the MetaFlows Security System (MSS) is that it really is a hybrid application.
The U.S. hosts 631 active command-and-control hubs for botnets, according to McAfee.
A younger workforce exhibiting risky online behavior is a trend that does not bode well for IT management faced with widening threats.
January 24, 2013
Although the promise of reduced costs has appealed to many enterprises looking to migrate legacy network systems to virtualization, security experts warn that the move must not trump careful contemplation and scrutiny by today's CIOs and IT leadership.
The "Cyber Targeted-Attack Analyzer" program would examine data sources across DoD's entire network to aid in threat detection.
Debate: Bug bounty programs - offering monetary rewards to researchers - help make companies more secure.
A bug report leads to an update in a Facebook app.
December 26, 2012
When you consider how many stakeholders are invested in Microsoft's Patch Tuesday, it's no wonder the monthly affair stirs up so much energy in the cyber world.
December 18, 2012
The threats to applications are evolving beyond the simple notion of "find exploit, access system, steal current data."
December 13, 2012
Available solutions are challenged to detect and protect identity and authenticate users.
Mobile purchases are expected to make up large chunk of the increased security spend, according to The 451 Group.
December 03, 2012
A Q&A with Brian Calkin assistant director, Multi-State ISAC Security Operations Center at the Center for Internet Security.
December 03, 2012
A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.
November 20, 2012
With massive DDoS attacks targeting specific accounts, online banking and other e-commerce activities are under seige.
The U.S. Department of Homeland Security awarded 34 contracts to secure domestic critical infrastructure.
Mila Parkour's cloud storage account on MediaFire was shut down Thursday and part of Friday due to alleged copyright infractions of patches and exploit samples she had studied.
SC Magazine catches up with Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation, who provides some legal guidance for researchers in the industry.