Cyber Attack

Retailers join forces to share threat intelligence

Retailers join forces to share threat intelligence

By

The Retail Industry Leadership Association along with Nike, Target and other retailers have launched a Retail Cyber Intelligence Sharing Center for guarding against cyber attacks.

Japan simulates cyber attack leading up to 2020 Olympics

By

More than 200 defense specialists gathered during the drill which was aimed at government and private industry groups.

SC Congress NY: Anticipate threats for best defense

By

Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.

Anatomy of an Attack

Anatomy of an Attack

Traditional approaches to security breaches on the Internet will no longer work. A multi-vector attack requires a multi-vector security strategy.

Infrastructure wake up call

Infrastructure wake up call

The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.

Video: Analyzing DDoS Attacks

By

Ashley Stephenson, EVP of Corero Network Security, visits the SC Magazine offices to discuss one of the most popular attack methods used by cyber criminals.

Think identity theft can't happen to you? Think Again

Think identity theft can't happen to you? Think Again

With fraud complaints more than doubling over the past five years, protecting private information is more critical than ever for those who rely on the internet for communicating personal and financial data.

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

By

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Facebook users experience two-hour blackout

By

Facebook users in Europe experienced a two-hour blackout that the company describes as "technical difficulties."

Michael Jackson catalog among files stolen in Sony breach

By

Sony's big 2011 breach was followed up by another attack that siphoned the King of Pop's entire music catalog.

RSA Conference 2012: Swapping info on the smart grid

By

Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.

Debate: The attack du jour, APTs, are real threats.

By

The attack du jour, APTs, or advanced persistent threats, are real threats.

Deception and the art of cyber security

To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.

Forensic incident response to the fore

We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.

2012 cyber crime predictions: More arrests and Willie Sutton 2.0

More cyber crime rings will be broken up in 2012, but the risk/reward ratio for cyber crime will remain criminal friendly.

Cyber-based spying fastest growing form of espionage, says Canadian spy lead

By

Cyber intrusions into Canada government sites announced in February did more damage than initially admitted.

HBGary faces Congressional probe

By

A Congressional probe into the activities of HBGary Federal follows revelations that the company, together with two other security firms, may have conspired to sabotage opponents.

Hackers breach Nasdaq; trading systems not affected

By

Nasdaq OMX, the company that runs the world's largest electronic stock exchange, said it detected suspicious files on its U.S. servers.

Cyberwarfare Roshambo: th3j35t3r Profiled

One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.

Hired guns: Cyberwar PsyOps, Part 2

Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?

Sign up to our newsletters

POLL