One of the many possible cyber scenarios keeping U.S. commanders awake at night is having the Islamic State develop the capability to alter sensitive information that could endanger American forces.
A new back door trojan created to siphon information has been detected by Symantec researchers.
A report finds terrorists are largely uninterested in using readily available communication methods found on the dark web.
Defense Secretary Ash Carter used his personal email account to conduct official business until December 2015, according to documents revealed from a Freedom of Information Act request.
A Chinese citizen pleaded guilty yesterday to participating in a conspiracy to hack into the computer systems of several major U.S. defense manufacturers.
U.S. government attempts to fend off millions of cybersecurity threats each year, according to a report released by the Office of Management and Budget (OMB).
The National Institute of Standards and Technology (NIST) released draft guidance for telework protocol, an update to the federal agency's initial documents drafted in 2009.
U.S. officials expect successful cooperation with the private sector will bear little resemblance to a traditional recruiting model.
Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco.
The NSA's SKYNET program earned some unwanted attention after a report said the agency's machine learning algorithm is inadequate.
The Senate Homeland Security and Governmental Affairs Committee approved Beth Cobert as nominee for director of the Office of Personnel Management (OPM).
The National Security Agency unveiled an ambitious reorganization that pulls together the agency's offensive and defensive operations.
The Better Business Bureau posted a notice to help potential victims of the Office of Personnel Management (OPM) breach and others determine whether letters claiming to be from the OPM are legitimate.
Microsoft unveiled a revised policy to inform users when it believes an account has been targeted by state-sponsored hackers.
China's anti-terrorism legislation is the latest escalation in a race between China and Western government to enact aggressive surveillance policy.
France reportedly saw a sharp increase in attempted cyber attacks in the weeks leading up to the terror attacks in Paris last week.
The mysterious group behind the 2013 cyber attacks that crippled South Korean news stations, financial institutions, and government websites is likely the same attacker behind malware that appeared in Europe recently, according to Palo Alto Networks.
In an environment in which cyber professionals are overwhelmed by rapidly changing security threats, industry pros generally agree that a remediation plan must involve difficult decisions about the security issues that companies are willing to accept the risk rather than take action.
U.S. and Cuban officials met Monday to discuss cybercrime, according to the State Department.
Check Point Software Technologies published a report on Monday that identifies a man it believes to be the mastermind behind Rocket Kitten's phishing emails and attacks.
German police, working with the European Union's criminal intelligence and judicial agencies Europol and Eurojust, conducted raids on the homes of DroidJack users throughout Germany.
The U.S. and South Korea announced that the two nations will begin working together to implement stronger cybersecurity strategies.
Following a rising number of cyberattacks against U.S. companies, cyber insurance premiums have spiked this year, according to Marsh data.
The Chinese government arrested a group of hackers within its borders at the request of the U.S. government, anonymous U.S. officials told the Washington Post.
The United States and China announced Friday that the two nations have agreed to initial norms of cyber activities.
Kaspersky Lab claims to have pinpointed how the Turla cyber-espionage group has been able to hide its command and control servers for the past eight years.
The Darkhotel APT group swapped out its previous Flash zero-days this past month for an exposed Hacking Team zero-day.
A secret NSA map was obtained by a news outlet shows the locations of "Victims of Chinese Cyber Espionage" targets based in the U.S.
Vague language in a new Chinese security law has multinational tech firms concerned that China may use it to force them to build backdoors or provide encryption keys and source code.
Lawmakers proposed "Protecting Individuals from Mass Aerial Surveillance Act" on Wednesday to require federal authorities to obtain warrants to conduct aerial surveillance.
SC Magazine Articles
- Was Spotify breached? Account info shows up on Pastebin
- Report: Ransomware feeds off poor endpoint security
- Researcher finds backdoor that accessed Facebook employee passwords
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- FBI investigating attack against computer networks at U.S. law firms
- Pros examine Mossack Fonseca breach: WordPress plugin, Drupal likely suspects
- First Choice Credit Union files class-action suit against Wendy's over breach
- Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts
- Researchers spot Android Infostealer disguised as Chrome update
- Researchers spot mobile malware competition on the black market
- Judge ruled go ahead for claims of phone hacking against UK tabloid