The Securities and Exchange Commission (SEC) is asking hacked firms to provide details on their breaches where stolen information from emails may have been used for insider trading.
A cyberespionage dubbed "Lotus Blossom" has carried out more than 50 cyber attacks against military and government targets in Hong Kong, Taiwan, Vietnam, the Philippines, and Indonesia.
The news that Kaspersky Lab was hit by a "next-generation" malware attack is an indication of both how far we have come in cyber-warfare and how much further we still have to go.
More than 400 security pros from companies of all sizes in 61 countries completed self-assessment tests against NIST Cybersecurity Framework for RSA's Cybersecurity Poverty Index.
IRS Commissioner John Koskinen said budget cuts are prompting the agency to expand its online services even as watchdog groups warn the expansion could increase the risk of additional breaches.
With mega breaches springing up one after another, many industry players have registered both disbelief and awe at the sheer numbers of individual credentials stolen.
Researchers have discovered a new type of of malware, dubbed 'Linux Moose,' that targets Linux based devices and uses them to create fraudulent social media accounts.
An Ohio student is under investigation for hacking into a school district server and sharing the information of at least one other student.
Russia and Chiana have agreed to join forces stop not hack each other as well as to fight cyber attacks as well.
Netflix announced on Monday the open source release of a threat detection management platform it has named FIDO.
Indian officials met with a Japanese contingent last week to discuss how the two nations could work together to fight cyber crime and invest in India's IT sector.
EllisLab doesn't yet know who's responsible for hacking into its servers March 24 and potentially compromising customer information.
Rutgers and the FBI are collaborating to investigate a series of DDoS attacks against the university.
The United States and Japan have agreed to bolster their threat-sharing efforts, to thwart cyber attacks from China and North Korea, like state-sponsored intellectual property theft.
CNN has reported that Russian hackers used their intrusion into the State Department's systems as a way to get into White House systems.
As the level of sophistication of digital attacks grows rapidly, targeted organizations must devise a strategic, military-like response.
At a gathering of security experts on Thursday in New York, panelists warned that while launching an offensive strike against cyber attackers might be a tempting response to being breached, there are better -- and legal -- strategies for retribution.
An examination of the evolution from the 2010 and 2011 campaign operations provides some hints about what IT vendors might expect from hacktivists in 2012.
The National Security Agency claims a dozen groups connected to China's People's Liberation Army and six nonmilitary groups connected to universities are largely behind cyber spying campaigns.
The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
Today's flurry of cybercrimes rely on an array of motivations, techniques and technologies, making the job of an investigator to track down the offender that much more difficult.
The Canadian intelligence service has singled out cyber attacks as one of the biggest threats facing Canada in its latest annual report.
Canada's telecommunications networks are vulnerable to homegrown terrorists, concluded the Special Senate Committee on Anti-terrorism.
The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the good guys are closing in.
In 2011 and the new age of cyberwarfare, what differentiates a military corporation from a security corporation? Are you now working in a cyberwarfare capacity? If so, what restrictions on global trade should CIOs be concerned with?
As the holiday season continues, users should be on high alert for scams such as malware-laden electronic greeting cards and screensavers, US-CERT has warned. In addition, phishing attacks may be disguised as requests for charitable donations, credit card applications and online shopping advertisements. US-CERT recommends that users avoid opening unexpected email attachments or following untrusted links. When donating to charities, individuals should verify the organization's authenticity with the Better Business Bureau. — AM
Thefts of information belonging to customers of two major American chains may be traceable back to a breach at an email marketing services firm.
Though some have labeled the website attacks surrounding the WikiLeaks controversy to be the first-ever global cyberwar, security experts say the truth is much less sensational.
The FBI issued a warning on Wednesday about so-called "smishing" and "vishing" scams, which are likely to be prevalent this holiday season.
Social networking sites and search engines are expected to be hit hard as cybercriminals try to wrangle in unsuspecting holiday shoppers.
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- Study: Organizations taking months to remediate vulnerabilities
- U.S., China agree to cybersecurity code of conduct