Australian Prime Minister Malcolm Turnbull and President Obama promised to increase their team effort to combat the ISIS online threat.
Small businesses and retailers should expect cybercriminals to pay extra attention to them in the coming months with ransomware and point of sale attacks becoming even more common.
Sixty-one percent of CEOs are concerned that cyberthreats could have negative impact on their corporate growth prospects, according to PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.
Researchers at Malwarebytes challenge claims the Mac OSX had the most vulnerabilities in 2015.
In the wake of North Korea testing a nuclear device earlier this week, the South Korean military has raised its cybersecurity level as a precautionary measure.
BIMCO today introduced the first set of cybersecurity guidelines for the global shipping industry to help prevent cyber incidents at sea.
Tech support scammers have found a new online base of operations to push their particular breed of malware moving to Rackspace from Amazon Web Services.
Two different groups of researchers at National Institute of Standards and Technology and the University of Oxford published research that puts the encryption-breaking potential of quantum computers one step closer to reality.
Joomla! has released the latest version, 3.4.7, of its free content management system software to address two reported security vulnerabilities.
Akamai's Q3 2015 State of the Internet - Security Report offered up a mixed bag of news indicating a very large increase in distributed denial of service attacks, while noting the length and severity of the incidents were down.
No one wants to plan for a breach, but its what you ought to do if you want to minimise the costs, data losses and reputational damage when the inevitable happens, hence the avid pre-planning at last week's SC roundtable.
Security watchers warn of authentication and authorisation flaws in Windows network environments
Researchers at Malwarebytes spotted a phony CSGO Shuffle site that delivers malware to unsuspecting Steam users.
Wisconsin Dells, Wis.-based Kalahari Resorts announced that its Ohio and Wisconsin resorts were hit by a point-of-sale (POS) breach.
Researchers at Trend Micro spotted the ransomware Chimera in the wild offering victims a commission.
Researchers at SANS Internet Storm Center spotted a nuclear exploit kit delivering the Cryptowall ransomware in nuclear exploit kits.
The future of warfare where a cyber component is added to the traditional land, air and sea battles can be seen in the Ukraine as it struggles to fend off cyber groups determined to undermine their war against Russian-backed separatists.
The results of the first FITARA scorecard are in, and it doesn't look good. The Government Accountability Office reviewed 24 government agencies on their progress implementing federal IT reforms.
A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars.
Mozilla has stepped up pressure on enterprise companies that continue to use SHA-1 certificates after research last month demonstrated the algorithm could be broken in as little as three months.
Most Americans hold the false belief that they have a firm grip on their home network's security level and children's internet activities even though they have taken few steps to ensure that this is true.
Twin brothers Muneeb and Sohaib Akhter were sentenced to prison by the Eastern District of Virginia for an array of offenses, including conspiracy to commit wire fraud, conspiracy to access a protected computer without authorization, conspiracy to access a government computer without authorization, and obstruction of justice.
A trio of Republican senators, including presidential candidate Marco Rubio, R-Fla., have introduced the North Korean Sanctions and Policy Enhancement Act of 2015 that would sanction the Hermit Kingdom for cyberattacks on the U.S..
Civilian nuclear power facilities may be more susceptible to cyber attack than the public generally realizes, according to a report by the London-based think tank Chatham House.
FireEye's EMEA president, Richard Turner discusses its new Advanced Threat Report
Analysis of big data in real time provides a granularity of insight into normal network behaviour, allowing earlier identification of abnormal behaviour.
A security researcher at Google has discovered more zero-day exploits in Kaspersky's anti-virus software.
If you see this code and you are using Google Chrome, don't click it, type it in, copy it or even hover your mouse over it http:// a /%%30%30
Researchers at Malwarebytes spotted an email phishing scam on Wednesday that targets Amazon users in the UK.
The U.S. Air Force (USAF) is looking to expand its traditional electronic countermeasures capability to include the ability to carve into an enemy's computer network from the air.
Sign up to our newsletters
SC Magazine Articles
- CISO salaries and demand for cyber-skills skyrockets, surprising no-one
- Student SSNs exposed in University of Central Florida breach
- Malwarebytes says sorry for multiple AV bugs, still unpatched
- Ransomware and POS attackers to zero in on small businesses, retailers
- TaxAct breached: Customer banking and Social Security information compromised
- Dyre Trojan almost dead after 'takedown' by the Russians
- Hacker threatens to expose info on DHS, FBI employees
- Avast patches its web browser after Google finds flaw in Chromium-inspired product
- Draft bill seeks to improve U.S. military cyber warfare capabilities
- Skype targeted by T9000 backdoor trojan