A long-overdue change
In his own home, a researcher was able to hack various network connected devices that are not computers and mobile phones.
This month's threat stats look into U.S. and international hackers' attack preferences. U.S. attackers favor the Allaple.A worm, whereas foreign hackers often harness the Zero Access trojan.
The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.
Philippe Courtot, chairman and CEO of Qualys, chats with SC Magazine about the Trustworthy Internet Movement, and how it looks to take on some of the challenges that businesses and users face when using the internet.