You searched for breach/ | Page 874 of 887 | SC Media

Your search for breach/ returned 8870 results

Your search for breach/ returned 8870 results

Sort Results:

Relevant Recent
Peter Stephenson
The Threat Hunter Blog

WannaCry Attribution: I’m Not Convinced Kim Dunnit, but a Russian….

Of all the things we do in threat hunting, attribution is the toughest and least reliable.  This is not a spoiler alert, but I can tell you in the first paragraph of this blog (so I will) that there is no credible attribution of the WannaCry attacks yet.  Of course, as I’m writing this that…
2014 Women in IT Security: Making headway
Features

2014 Women in IT Security: Making headway

Though plenty of work remains to be done in closing the industry's gender gap, this inaugural issue of SC Magazine takes the step of highlighting women for their noteworthy contributions to the IT security and privacy space.
Features

Securing Image Content in Email

What arrives in our in-boxes these days is becoming progressively richer and fatter. The content includes HTML formatted rich text, hyperlinks and attachments of various types, including Office documents, databases, images, videos, etc. It is now estimated that more than 5 per cent of emails contain images.
Features

Organizations turn to new techniques to fight financially motivated attacks

When the University of California, Los Angeles (UCLA) recently announced that hackers had compromised a database of more than 800,000 people associated with the university, perhaps one of the most shocking aspects of the event was how long the bad guys had gone undetected. The hackers accessed information for over a year before security personnel at UCLA suspected any malfeasance.
Security News

A view from the top

Compliance issues and identity theft incidents may have dominated 2005, but other problems will unfold over coming months.
Next post in Security News