Ercan Findikoglu's extradition to the U.S. was blocked by a German court because his possible sentence was deemed too extreme.
In a notification letter to customers, Amex said law enforcement has arrested an individual possessing stolen personal and account information.
Trend Micro researchers observing two keyloggers have released their findings in a paper.
There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.
Students at the University of British Columbia have been warned that their personal information may have been exposed thanks to a software bug.
New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.
A cyber liability policy covers first-party liability (property and theft) and third-party liability (privacy and data security).
In order to cause disruption within the stolen data markets of the dark web, its organizational structure must be analyzed, according to one expert at DefCon 22 in Las Vegas.
In a speech to Parliament, Queen Elizabeth said the country would pursue legislation to strengthen penalties for cyber crime.
The Chinese government says it will scrutinize both foreign and domestic offerings and ban vendors that don't pass muster.
As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).
Fraudsters tampered with the point-of-sales devices at a number of locations to steal customers' debit and credit card information.
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
Authorities believe Raynaldo Rivera joined previously accused Cody Kretsinger in compromising SonyPictures.com to steal personal information on about a million people.
HIPAA violations are becoming more common around the nation. To find the source of the problem you have to "follow the money."
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Two men each have been sentenced to 36 months in prison for withdrawing tens of thousands of dollars from ATMs with credit card information that was stolen from craft-store retail chain Michaels Stores.
The Anti-Phishing Working Group tells us that phishing is alive and well, but another report suggests that spear-phishing is even healthier - for the criminals, at least.
An individual has no intrinsic, inalienable right to leave his own system unprotected if by doing so he puts others at risk.
The FTC has made major moves this year in its fight against cyber crime, and if enterprises and organizations aren't careful, they may be facing a team of the agency's investigators.
A jury in New Jersey has found a Georgia man guilty for his role in a fraud ring that cost financial companies some $1.5 million.
The FBI's cyber division has a new assistant director, Joseph Demarest, who formerly served as assistant director for international operations.
Information security experts often talk about the costs of cybercrime to businesses, but a new report from Russia quantifies how much criminals make in the "cybercrime market."
An examination of the evolution from the 2010 and 2011 campaign operations provides some hints about what IT vendors might expect from hacktivists in 2012.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Who is behind the production, distribution and exploitation of malicious software today? Knowing the answer is a vital tool in the fight against cyber crime.
John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.
The Science and Technology Committee seems to be taking malware and cyber crime seriously.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access