Following a number of recent headline-grabbing breaches, a panel of foreign relations experts convened at the Atlantic Council to discuss retaliation against hackers.
A secret NSA map was obtained by a news outlet shows the locations of "Victims of Chinese Cyber Espionage" targets based in the U.S.
Japan will train approximately 50,000 people in the public and private sectors on cyber-security ahead of the 2020 Summer Olympics in Tokyo, according to local reports.
A study by Lloyd's of London and the Centre for Risk Studies at Cambridge University predicted severe losses in a catastrophic attack on the power grid and a separate poll found that voters were worried as well about those attacks.
From June 8 through June 26 more than 100 organizations participated in the fourth annual Cyber Guard exercise.
The attacks reportedly date back a year, and happened as recently as Tuesday morning.
IOActive, Kaspersky Lab, and the Cloud Security Alliance are among the security organizations supporting the effort.
Trend Micro and the Organization of American States (OAS) polled 575 critical infrastructure security leaders in the Americas.
On Wednesday, the President declared the need to address "malicious cyber-enabled activities" orchestrated by foreign attackers a national emergency.
Four GE products and one MACTek product are impacted by the vulnerability, according to ICS-CERT.
Shared Services Canada plans to spend $55 million to upgrade IT infrastructure.
The updated guide will offer insight on reducing risks to industrial control systems, such as malware, equipment failures, and other threats.
A German iron plant fell victim to a cyberattack that caused physical damage, according to a report on Wednesday from a German federal agency.
The U.S. House of Representatives and the Senate passed to the CyberSecurity Enhancement Act of 2014, giving NIST the go-ahead to develop voluntary cyber standards for critical infrastructure.
The U.S. House of Representatives unanimously approved three bills, including the Critical Infrastructure Protection Act.
The attacks were detected and incident response began immediately, with unscheduled maintenance being performed to mitigate the threat.
The Department of Energy contract will allow Norse to support the agency's Cybersecurity Risk Information Sharing Program (CRISP).
Simulation exercises show how companies should respond under a cyberattack, says HHS's Sara Hall. Teri Robinson reports.
A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.
Following U.S. military airstrikes in the Middle East, the FBI has issued a warning regarding possible cyber threats aimed at U.S. networks and critical infrastructure by hacktivists in support of ISIS.
Two Trend Micro experts sit with us to discuss research they've conducted concerning critical infrastructure and the future of the threat landscape.
Though no attacks were successful, ICS-CERT said the incidents show a glaring need for operators to remain vigilant in monitoring and thwarting network intrusions.
The vulnerability was found in two programmable gateway devices often used by auto, food and manufacturing businesses in the United States. Meanwhile, a new study shows attacks against utility companies are growing.
While a major attack has yet to take place on the U.S. energy sector, now is the right time for these critical infrastructure providers to ready their defenses.
Not only are there new security concerns, but leaders must ensure disparate groups of workers can adequately collaborate.
The unsuccessful attacks were the result of email addresses being publicly posted on an electric company's website.
Honeypots installed by researchers at security firm Trend Micro provided bait for 39 attacks on simulated ICS environments over the course of a month.
A virus has reportedly shut down the energy company's website and email servers, giving rise to questions of whether the Shamoon virus is to blame.
Oil company Saudi Aramco has yet to confirm whether a virus, which struck 30,000 of its workstations, is Shamoon -- malware said to be targeting the Middle East energy sector.
Shamoon, malware that overwrites files to the point of making computers unusable, has been described as a targeted, yet damaging threat.
Sign up to our newsletters
SC Magazine Articles
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- Women in IT Security: 10 Power Players
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Report: Phishing costs average organization $3.7 million per year
- Women in IT Security: Women of influence
- DOJ issues new 'stingray' policies and begins requiring a warrant
- Outdated websites deliver TeslaCrypt via Neutrino Exploit Kit: Heimdal
- Scammers and schemers look to cash in on Ashley Madison breach
- ACLU asks DOJ to withhold funds for LAPD body cams
- A question of balance between security solutions and the people who use it