Trend Micro's second quarter threat report hit on several security issues, including threats that pose an actual physical threat to the public.
The Chinese Ministry of Public Security arrested 15,000 people for cybercrimes as part of a long-term operation dubbed "Cleaning the Internet."
A Russian hacker illegally manipulated over a dozen penny stocks generating more than $77,000 AUD in false profits, according to the Australian Securities & Investment Commission (ASIC).
Three top-selling smart home hubs on Amazon have zero-day vulnerabilities that could allow an outsider entry into the user's home, Tripwire reported.
A federal appeals court has breathed new life into a class action lawsuit against Neiman Marcus regarding the data breach the retailer experienced in 2013.
Rutgers and the FBI are collaborating to investigate a series of DDoS attacks against the university.
Attackers compromised the Twitter feeds of Tesla and company co-founder Elon Musk where they posted false claims.
It's clear that cyber-crimes are alive and well on the global stage and will only continue to be pervasive as long as organizations prolong taking the necessary defense measures to stop threats from slipping through the cracks.
Ten of White Lodging's properties have been affected by a POS data breach that lasted from July 2014 to February of this year.
Romanian citizen Mircea-Ilie Ispasoiu made his first appearance in a New Jersey federal court after being extradited to the U.S. for allegedly orchestrating an international hacking scheme.
A Russian man who was arrested in Spain on suspicion of cyber fraud reportedly will be extradited to the U.S. within the next few days.
A misstep by an IT employee of Canadian communications conglomerate Rogers Communications allowed the contractual information of 50-70 of the company's business customers to be exposed via Twitter.
Social engineering will always be a looming threat for organizations, and spear phishing plays a significant part.
Canada's companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute.
Ercan Findikoglu's extradition to the U.S. was blocked by a German court because his possible sentence was deemed too extreme.
In a notification letter to customers, Amex said law enforcement has arrested an individual possessing stolen personal and account information.
Trend Micro researchers observing two keyloggers have released their findings in a paper.
There now are more mobile devices on the planet than humans, and cyber criminals are targeting them at an increasing rate.
Students at the University of British Columbia have been warned that their personal information may have been exposed thanks to a software bug.
New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.
A cyber liability policy covers first-party liability (property and theft) and third-party liability (privacy and data security).
In order to cause disruption within the stolen data markets of the dark web, its organizational structure must be analyzed, according to one expert at DefCon 22 in Las Vegas.
In a speech to Parliament, Queen Elizabeth said the country would pursue legislation to strengthen penalties for cyber crime.
The Chinese government says it will scrutinize both foreign and domestic offerings and ban vendors that don't pass muster.
As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).
Fraudsters tampered with the point-of-sales devices at a number of locations to steal customers' debit and credit card information.
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
Authorities believe Raynaldo Rivera joined previously accused Cody Kretsinger in compromising SonyPictures.com to steal personal information on about a million people.
HIPAA violations are becoming more common around the nation. To find the source of the problem you have to "follow the money."
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
Sign up to our newsletters
SC Magazine Articles
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- Women in IT Security: 10 Power Players
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Report: Phishing costs average organization $3.7 million per year
- Women in IT Security: Women of influence