A federal appeals court has breathed new life into a class action lawsuit against Neiman Marcus regarding the data breach the retailer experienced in 2013.
Rutgers and the FBI are collaborating to investigate a series of DDoS attacks against the university.
Attackers compromised the Twitter feeds of Tesla and company co-founder Elon Musk where they posted false claims.
It's clear that cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks.
Ten of White Lodging's properties have been affected by a POS data breach that lasted from July 2014 to February of this year.
Romanian citizen Mircea-Ilie Ispasoiu made his first appearance in a New Jersey federal court after being extradited to the U.S. for allegedly orchestrating an international hacking scheme.
A Russian man who was arrested in Spain on suspicion of cyber fraud reportedly will be extradited to the U.S. within the next few days.
A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.
Social engineering will always be a looming threat for organizations, and spear phishing plays a significant part.
Canada's companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute.
Ercan Findikoglu's extradition to the U.S. was blocked by a German court because his possible sentence was deemed too extreme.
In a notification letter to customers, Amex said law enforcement has arrested an individual possessing stolen personal and account information.
Trend Micro researchers observing two keyloggers have released their findings in a paper.
There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.
Students at the University of British Columbia have been warned that their personal information may have been exposed thanks to a software bug.
New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.
A cyber liability policy covers first-party liability (property and theft) and third-party liability (privacy and data security).
In order to cause disruption within the stolen data markets of the dark web, its organizational structure must be analyzed, according to one expert at DefCon 22 in Las Vegas.
In a speech to Parliament, Queen Elizabeth said the country would pursue legislation to strengthen penalties for cyber crime.
The Chinese government says it will scrutinize both foreign and domestic offerings and ban vendors that don't pass muster.
As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).
Fraudsters tampered with the point-of-sales devices at a number of locations to steal customers' debit and credit card information.
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
Authorities believe Raynaldo Rivera joined previously accused Cody Kretsinger in compromising SonyPictures.com to steal personal information on about a million people.
HIPAA violations are becoming more common around the nation. To find the source of the problem you have to "follow the money."
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Two men each have been sentenced to 36 months in prison for withdrawing tens of thousands of dollars from ATMs with credit card information that was stolen from craft-store retail chain Michaels Stores.
The Anti-Phishing Working Group tells us that phishing is alive and well, but another report suggests that spear-phishing is even healthier - for the criminals, at least.
An individual has no intrinsic, inalienable right to leave his own system unprotected if by doing so he puts others at risk.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- All smartwatches are vulnerable to attack, finds study
- Fake games in Google Play redirect Android users to porn sites
- Hacking Team issues new statement while researcher clears up Android tool confusion
- Google Drive influences new phishing campaign
- Researcher finds several vulnerabilities in PHP File Manager
- Survey: Nearly all Americans support and want retaliation for cyberattacks
- 'Black Vine' group breached Anthem, leveraged zero-day bugs in various campaigns
- Data on 5,300 Healthfirst members caught up in fraud scheme