The OpenSSL Project said it has updated its security policy to include a "Critical" severity level.
Paul Kurtz, CEO of TruSTAR Technology and former cybersecurity advisor to the White House, discusses the federal government's cybersecurity problems, in the wake of the data breaches at the Office of Personnel Management (OPM).
The Federal Financial Institutions Examination Council (FFIEC) recently released the Cybersecurity Assessment Tool (CAT) to help financial institutions identify their risks and determine their cybersecurity preparedness.
Business that embrace bring your own device (BYOD) could gain from Apple's improved security features.
Researchers at Zscaler's discovered a new variant of Android ransomware disguised as a porn video player application.
In an apparent coordinated announcement, Google, Mozilla and Microsoft announced that they would stop using the RC4 stream cipher in their respective browsers.
Rutgers hired three cybersecurity firms and plans to spend millions to protect its computer networks
Researchers at WOOT '15 demonstrated how the BitTorrent protocol family is vulnerable to DRDoS attacks.
Secretary of State John Kerry told CBS that "it's very likely" that Chinese and Russian governments are reading his emails.
WordPress released a security update to address several vulnerabilities that existed in all previous versions.
Japan will train approximately 50,000 people in the public and private sectors on cyber-security ahead of the 2020 Summer Olympics in Tokyo, according to local reports.
An Ohio inmate was caught with administrative login credentials for the computer systems at Lebanon Correctional Intuition.
An amendment to the Every Child Achieves Act takes on cybersecurity education in an effort to address worker shortage.
The news that Kaspersky Lab was hit by a "next-generation" malware attack is an indication of both how far we have come in cyber-warfare and how much further we still have to go.
IRS Commissioner John Koskinen said budget cuts are prompting the agency to expand its online services even as watchdog groups warn the expansion could increase the risk of additional breaches.
A new survey shows board members across several industries are holding more C-level execs responsible in cases of data breaches.
Netflix announced on Monday the open source release of a threat detection management platform it has named FIDO.
Indian officials met with a Japanese contingent last week to discuss how the two nations could work together to fight cyber crime and invest in India's IT sector.
The United States and Japan have agreed to bolster their threat-sharing efforts, to thwart cyber attacks from China and North Korea, like state-sponsored intellectual property theft.
In this video, Casey Ellis, cofounder and CEO of Bugcrowd, discusses bug hunting and responsible vulnerability disclosure.
In this video, Adam Kujawa, head of malware intelligence with Malwarebytes, takes us through the campaign.
In this video Danielle Walker interviews Cesar Cerrudo, CTO of IOActive, at RSA Conference 2015.
Teams will develop high-performance computers to compete in a CTF-style tournament at the 2016 DEF CON Conference in Las Vegas.
GE will purchase the cyber security company, known for protecting industrial sites and power plants.
Testifying before a House committee, the Comptroller General said the DHS remains on the high-risk list but is moving clear progress.
The Canadian government has unlocked $155 million in funding to bolster cyber security, just as the Auditor General issued a negative report.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.
Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army
Sign up to our newsletters
SC Magazine Articles
- FireEye: First multi-vendor ATM malware targeting cardholders
- Customer data possibly compromised in online photo store malware attack
- Excellus BlueCross BlueShield announces breach, 10.5M records at risk
- CVS employee steals data on 55K Molina Healthcare members
- False Facebook 'dislike button' ensnares users