NYMag.com was hit with a DDoS attack that lasted about 12 hours and was executed by a man with a vendetta against all things having to do with New York City.
HP's Zero Day Initiative (ZDI) disclosed four unpatched zero-day vulnerabilities in Internet Explorer Mobile that enable web-based attacks.
A pair of researchers discovered an exploit in Uconnect-enabled Fiat Chrysler vehicles that allows an attacker to take control of the vehicle.
FBI Director James Comey, speaking at the Aspen Security Forum, said that terrorists are mulling strategies for launching cyberattacks against the U.S.
A federal appeals court has breathed new life into a class action lawsuit against Neiman Marcus regarding the data breach the retailer experienced in 2013.
Japan will train approximately 50,000 people in the public and private sectors on cyber-security ahead of the 2020 Summer Olympics in Tokyo, according to local reports.
Online cheating site Ashley Madison has been hacked by a group calling itself 'The Impact Team', with 37 million customers' details potentially exposed.
Walmart Canada has taken down its online photo site and is investigating a compromise that may have impacted 60,000 people.
Instead of jail time, Seth Nolan McDonagh, a.k.a. Narko, was sentenced to 240 hours of community service for his part in one of the the biggest cyber attacks in history.
The third-party vendor responsible for operating payment systems at the Detroit Zoo experienced a POS breach that affected eight other zoos.
The Securities and Exchange Commission (SEC) is asking hacked firms to provide details on their breaches where stolen information from emails may have been used for insider trading.
A cyberespionage dubbed "Lotus Blossom" has carried out more than 50 cyber attacks against military and government targets in Hong Kong, Taiwan, Vietnam, the Philippines, and Indonesia.
The news that Kaspersky Lab was hit by a "next-generation" malware attack is an indication of both how far we have come in cyber-warfare and how much further we still have to go.
More than 400 security pros from companies of all sizes in 61 countries completed self-assessment tests against NIST Cybersecurity Framework for RSA's Cybersecurity Poverty Index.
IRS Commissioner John Koskinen said budget cuts are prompting the agency to expand its online services even as watchdog groups warn the expansion could increase the risk of additional breaches.
With mega breaches springing up one after another, many industry players have registered both disbelief and awe at the sheer numbers of individual credentials stolen.
Researchers have discovered a new type of of malware, dubbed 'Linux Moose,' that targets Linux based devices and uses them to create fraudulent social media accounts.
An Ohio student is under investigation for hacking into a school district server and sharing the information of at least one other student.
Russia and Chiana have agreed to join forces stop not hack each other as well as to fight cyber attacks as well.
Netflix announced on Monday the open source release of a threat detection management platform it has named FIDO.
Indian officials met with a Japanese contingent last week to discuss how the two nations could work together to fight cyber crime and invest in India's IT sector.
EllisLab doesn't yet know who's responsible for hacking into its servers March 24 and potentially compromising customer information.
Rutgers and the FBI are collaborating to investigate a series of DDoS attacks against the university.
The United States and Japan have agreed to bolster their threat-sharing efforts, to thwart cyber attacks from China and North Korea, like state-sponsored intellectual property theft.
CNN has reported that Russian hackers used their intrusion into the State Department's systems as a way to get into White House systems.
As the level of sophistication of digital attacks grows rapidly, targeted organizations must devise a strategic, military-like response.
At a gathering of security experts on Thursday in New York, panelists warned that while launching an offensive strike against cyber attackers might be a tempting response to being breached, there are better -- and legal -- strategies for retribution.
An examination of the evolution from the 2010 and 2011 campaign operations provides some hints about what IT vendors might expect from hacktivists in 2012.
The National Security Agency claims a dozen groups connected to China's People's Liberation Army and six nonmilitary groups connected to universities are largely behind cyber spying campaigns.
The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
Sign up to our newsletters
SC Magazine Articles
- Free security tools help detect Hacking Team malware
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Study: Half of critical infrastructure IT professionals believe major attack looming
- Fake games in Google Play redirect Android users to porn sites
- PNI Digital Media investigates potential credit card 'issue' as more photo center websites go down
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Critical Android bugs can be exploited via MMS, 950M users affected
- Breach affects 3,000 clients enrolled in Georgia state program
- Top of the app charts - Shuabang: automated malware made in China
- Federal appeals court rules no expectation of privacy for preventable 'butt dials'