Porn malware is spamming Facebook timelines and news feeds across India. Authorities say its part of the Kilim malware family.
Attackers claiming to be with the SEA compromised the official website for the U.S. Army, posting
A phishing scheme may have compromised the information of nearly 3,300 patients.
Italian Financial Police picked up more than 10 people who were purportedly part of an international criminal organization that laundered money from online scams.
Attackers compromised the Twitter feeds of Tesla and company co-founder Elon Musk where they posted false claims.
The Retail Industry Leadership Association along with Nike, Target and other retailers have launched a Retail Cyber Intelligence Sharing Center for guarding against cyber attacks.
More than 200 defense specialists gathered during the drill which was aimed at government and private industry groups.
Organizations shouldn't wait until they are the targets of sophisticated attacks to take action, according to a panel discussion at SC Congress New York.
Traditional approaches to security breaches on the Internet will no longer work. A multi-vector attack requires a multi-vector security strategy.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Ashley Stephenson, EVP of Corero Network Security, visits the SC Magazine offices to discuss one of the most popular attack methods used by cyber criminals.
With fraud complaints more than doubling over the past five years, protecting private information is more critical than ever for those who rely on the internet for communicating personal and financial data.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Facebook users in Europe experienced a two-hour blackout that the company describes as "technical difficulties."
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
The attack du jour, APTs, or advanced persistent threats, are real threats.
To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
More cyber crime rings will be broken up in 2012, but the risk/reward ratio for cyber crime will remain criminal friendly.
Cyber intrusions into Canada government sites announced in February did more damage than initially admitted.
A Congressional probe into the activities of HBGary Federal follows revelations that the company, together with two other security firms, may have conspired to sabotage opponents.
Nasdaq OMX, the company that runs the world's largest electronic stock exchange, said it detected suspicious files on its U.S. servers.
One great cyberwar campfire story for CIOs to share about DDoS toolkit compromises.
Which social media participants and private companies will become collateral damage in the ongoing Tunisian cyberwar?
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- Former Georgia-Pacific sysadmin charged with damaging protected computers
- Harvard University announces network intrusion, possible data exposure
- Saboteurs leverage RIPv1 for DDoS reflection attacks
- More than 440K new Android malware strains found in Q1, study finds
- Apple releases OS X 10.10.4 and iOS 8.4, numerous bugs addressed