Civilian nuclear power facilities may be more susceptible to cyber attack than the public generally realizes, according to a report by the London-based think tank Chatham House.
FireEye's EMEA president, Richard Turner discusses its new Advanced Threat Report
Analysis of big data in real time provides a granularity of insight into normal network behaviour, allowing earlier identification of abnormal behaviour.
A security researcher at Google has discovered more zero-day exploits in Kaspersky's anti-virus software.
If you see this code and you are using Google Chrome, don't click it, type it in, copy it or even hover your mouse over it http:// a /%%30%30
Researchers at Malwarebytes spotted an email phishing scam on Wednesday that targets Amazon users in the UK.
The U.S. Air Force (USAF) is looking to expand its traditional electronic countermeasures capability to include the ability to carve into an enemy's computer network from the air.
A Nigerian man was sentenced to more than 12 years in a prison and ordered to pay $13 million in restitution for his role in an internet fraud scheme
U.S. intelligence officials briefed the House Intelligence Committee at hearing on worldwide cyberthreats.
After nearly half a decade, GM finally got around to patching an exploit that left millions vulnerable to an attack that could seize control of a vehicle.
IBM's X-Force research team has reported that the recently discovered CoreBot malware has lived up to its earlier warnings quickly transforming into a full-fledged banking Trojan that is active in the wild.
Twitter accounts have claimed to be affiliated with ISIS and started the #AmericaUnderHacks hashtag, on the 14th anniversary of the 9/11 terrorist attacks.
The head of the U.S. Cyber Command believes his organization's capabilities need to be better integrated into all aspects of the country's cybersecurity effort and should be an integral part of all upcoming military plans.
When does cyberespionage cross the line into cyberwar? Adam Segal at the Council on Foreign Relations has answers.
A Las Vegas man pleaded guilty to sending more than 27 million Facebook messages in a massive spam campaign.
U.K. ham radio operators are the target of a phishing scam asking them to open a malware-infected attachment purportedly from Ofcom Spectrum Licensing.
NYMag.com was hit with a DDoS attack that lasted about 12 hours and was executed by a man with a vendetta against all things having to do with New York City.
With today's threat actors continuing to evolve their tradecraft by employing more advanced and evasive techniques, it's all about mitigating risk and the potential reach of any intrusion.
An Android stock browser vulnerability was discovered that could allow cyber criminals to "spoof" the address bars and potentially carry out phishing schemes.
A new 'threat sharing' cybersecurity bill was introduced by leaders of the U.S. House of Representatives Intelligence Committee.
2015 is setup to be one of the most dangerous years for not only your PC but also your mobile devices and cloud storage.
The Internet of Things requires a new way of thinking and acting, one that will protect a business and help it grow.
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks.
While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.
The "Threat of the Month" in our November issue are IE exploits.
You can protect your brand's online reputation, says ZeroSpam's David Poellhuber.
Sign up to our newsletters
SC Magazine Articles
- FireEye: First multi-vendor ATM malware targeting cardholders
- Customer data possibly compromised in online photo store malware attack
- Excellus BlueCross BlueShield announces breach, 10.5M records at risk
- CVS employee steals data on 55K Molina Healthcare members
- False Facebook 'dislike button' ensnares users