Researchers at RSA discovered GlassRAT malware that targets Chinese nationals, business interests and more.
The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.
Malwarebytes spotted malvertising on the Barclays Premier League official fantasy site that redirected users to Nuclear Exploit Kits that exploited Flash vulnerabilities.
RSA president Amit Yoran, speaking at the RSA Middle East conference, set out his tips for shifting the cyber-security industry's mindset toward data protection.
An unannounced data breach at a large firm prompted First National Bank of Omaha to reissue debit cards to customers in seven states.
Reports coming out of Ukraine suggest that the US is falling behind Russia in terms of cyber-warfare capabilities, while the importance of such capabilities is increasing.
An organization's people are its strongest asset when it comes to both discovering and mitigating a breach, according to the panelists on SC Congress New York 2015's Your Organization is breached: Now on to threat detection and intelligence.
The amount of financial damage a cyberattack inflicts on a company depends on many variables, but on average an enterprise-level corporation can expect to pay out more than $550,000 to recover from a typical attack.
Researchers in Singapore have developed a method to sniff the perimeter of an organization for unsecured printers.
Paul Kurtz, CEO of TruSTAR Technology and former cybersecurity advisor to the White House, discusses the federal government's cybersecurity problems, in the wake of the data breaches at the Office of Personnel Management (OPM).
The Dothan City, Ala., school board on Monday allocated $25,000 to purchase cyber liability insurance to cover the board in case a cyberattacker gains access to district information.
The news that top government ministers may have been hacked by the Cyber-Caliphate has set alarm bells ringing among security experts.
Recent cyberattacks have left U.S. officials mulling economic sanctions as retaliation against Russia and China.
When does cyberespionage cross the line into cyberwar? Adam Segal at the Council on Foreign Relations has answers.
A researcher discovered a zero-day vulnerability inside the x86 processor architecture that can allow attackers to install rootkits.
The weather may be warm now but retailers are already planning for the 2015 holiday season, when businesses will conduct as much as 20% of their total annual sales
Imperva believes cloud storage sites like Google Drive, Dropbox, OneDrive will be the next area corporations will have to defend in their on-going battle to keep their data under wraps.
Salita's Mexican Restaurant in Durant, Okla., experienced a POS breach that may have originated from outside the country.
Federal investigators have recommended charges be brought against at least one Cardinals employee for the Astros cyber attack.
Users of the video-sharing site Plex have been left vulnerable to an attack after the company revealed that members' passwords had been compromised.
Porn malware is spamming Facebook timelines and news feeds across India. Authorities say its part of the Kilim malware family.
Attackers claiming to be with the SEA compromised the official website for the U.S. Army, posting
A phishing scheme may have compromised the information of nearly 3,300 patients.
Italian Financial Police picked up more than 10 people who were purportedly part of an international criminal organization that laundered money from online scams.
Attackers compromised the Twitter feeds of Tesla and company co-founder Elon Musk where they posted false claims.
The Retail Industry Leadership Association along with Nike, Target and other retailers have launched a Retail Cyber Intelligence Sharing Center for guarding against cyber attacks.
More than 200 defense specialists gathered during the drill which was aimed at government and private industry groups.
Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.
Traditional approaches to security breaches on the Internet will no longer work. A multi-vector attack requires a multi-vector security strategy.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Sign up to our newsletters
SC Magazine Articles
- Anonymous hacks, 'Rickrolls' ISIS
- IBM, Oracle, Cisco certification manager breached, info accessed
- Hilton Worldwide confirms malware on POS targeted payment card info
- Algebraic Eraser, the algorithm running the 'Internet of Things' is broken...again
- Sony hackers remained hidden for months due to a new toolset: Damballa