Recent cyberattacks have left U.S. officials mulling economic sanctions as retaliation against Russia and China.
When does cyberespionage cross the line into cyberwar? Adam Segal at the Council on Foreign Relations has answers.
A researcher discovered a zero-day vulnerability inside the x86 processor architecture that can allow attackers to install rootkits.
The weather may be warm now but retailers are already planning for the 2015 holiday season, when businesses will conduct as much as 20% of their total annual sales
Imperva believes cloud storage sites like Google Drive, Dropbox, OneDrive will be the next area corporations will have to defend in their on-going battle to keep their data under wraps.
Salita's Mexican Restaurant in Durant, Okla., experienced a POS breach that may have originated from outside the country.
Federal investigators have recommended charges be brought against at least one Cardinals employee for the Astros cyber attack.
Users of the video-sharing site Plex have been left vulnerable to an attack after the company revealed that members' passwords had been compromised.
Porn malware is spamming Facebook timelines and news feeds across India. Authorities say its part of the Kilim malware family.
Attackers claiming to be with the SEA compromised the official website for the U.S. Army, posting
A phishing scheme may have compromised the information of nearly 3,300 patients.
Italian Financial Police picked up more than 10 people who were purportedly part of an international criminal organization that laundered money from online scams.
Attackers compromised the Twitter feeds of Tesla and company co-founder Elon Musk where they posted false claims.
The Retail Industry Leadership Association along with Nike, Target and other retailers have launched a Retail Cyber Intelligence Sharing Center for guarding against cyber attacks.
More than 200 defense specialists gathered during the drill which was aimed at government and private industry groups.
Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.
Traditional approaches to security breaches on the Internet will no longer work. A multi-vector attack requires a multi-vector security strategy.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Ashley Stephenson, EVP of Corero Network Security, visits the SC Magazine offices to discuss one of the most popular attack methods used by cyber criminals.
With fraud complaints more than doubling over the past five years, protecting private information is more critical than ever for those who rely on the internet for communicating personal and financial data.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Facebook users in Europe experienced a two-hour blackout that the company describes as "technical difficulties."
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
The attack du jour, APTs, or advanced persistent threats, are real threats.
To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
More cyber crime rings will be broken up in 2012, but the risk/reward ratio for cyber crime will remain criminal friendly.
Cyber intrusions into Canada government sites announced in February did more damage than initially admitted.
A Congressional probe into the activities of HBGary Federal follows revelations that the company, together with two other security firms, may have conspired to sabotage opponents.
Nasdaq OMX, the company that runs the world's largest electronic stock exchange, said it detected suspicious files on its U.S. servers.
Sign up to our newsletters
SC Magazine Articles
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- Women in IT Security: 10 Power Players
- Report: Phishing costs average organization $3.7 million per year
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Women in IT Security: Women of influence
- DOJ issues new 'stingray' policies and begins requiring a warrant
- Outdated websites deliver TeslaCrypt via Neutrino Exploit Kit: Heimdal
- Scammers and schemers look to cash in on Ashley Madison breach
- ACLU asks DOJ to withhold funds for LAPD body cams
- A question of balance between security solutions and the people who use it