A supposedly legitimate French software firm, Tuto4PC, has actually infected an estimated 12 million PC users with a generic Trojan disguised as downloadable utilities programs, according to an analysis from Cisco's Talos research division.
To say that a day does not pass without a ransomware attack being perpetrated upon an organization somewhere the United States is no hyperbolic statement, but there is a glimmer of hope as several defective ransomware variants have been found.
Hackers reportedly posted employee data and private documents belonging to a publicly listed gold-mining company on a paste site.
The PCI Data Security Standard version 3.2 released Thursday not only includes new requirements to safeguard payment data, including multifactor authentication.
Richard Nichols, RSA's head of EMEA strategy compared playing the violin to conducting an effective security strategy, to encourage businesses to harmonise security strategy and promote greater visibility of threats on the business.
Data Breach Blog
Seattle-based pet store LuckyPet notified the California State Attorney General's office of a data breach that compromised online customer information.
Incidents of fraud were reported after an unauthorized person accessed an Archdiocese of Denver database maintained by a third-party and which contained PII on 18,000 former and current employees and their dependents.
An attacker used a phishing attack to obtain personal identifiable information (PII) on thousands of employees of the Olympia School District.
A new site was discovered on the dark web that allows hackers to upload stolen data and sell the data to criminals or criminal groups.
The Threat Hunter Blog
We've been examining some of the newer - or, at least, most currently prevalent - strains of ransomware. This time we look at Locky.
SC April 2016 Product Reviews
There is nothing like this that we've seen. It's a neat idea, well conceived and executed and, if you are thinking about adding biometrics to your app, this might just be the thing to make your decision for you.
A unique and user-friendly approach to strong authentication. This fits well in a banking environment and with other Datablink products can provide more universal authentication to such things as networks.
If you are looking for a front-end authentication portal that works well in a distributed environment, this one demands your consideration.
Me and my job: Karthik Rangarajan security engineer, Addepar
If Apple complies, the FBI would have the ability to compromise personal security when it wishes, says Ryan O'Leary, VP of Threat Research Center, WhiteHat Security. .
In cases where terrorist attacks are carried out state-side, it is vital that intelligence be obtained, says J.J. Thompson, CEO, Rook Security.
SC Magazine Articles
- Was Spotify breached? Account info shows up on Pastebin
- Report: Ransomware feeds off poor endpoint security
- Researcher finds backdoor that accessed Facebook employee passwords
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- FBI investigating attack against computer networks at U.S. law firms
- Ransomware rampant, but chinks found in its armor
- Mining company's data is more valuable than gold
- PCI DSS version 3.2 release extends multifactor authentication requirement
- RSA EMEA Summit: Writing a security strategy that will make Vivaldi proud
- U.S. CIO hints federal adoption of 'bimodal IT' to balance old and new tech