A number of storage devices belonging to the California Department of Child Support Services went missing while in transit.
The attacks, which occurred at four department locations, were not described in detail, but were deemed "successful" for adversaries, according to the annual audit.
With Hurricane Irene barreling up the East Coast and making a beeline for the major Northeast cities, businesses not used to dealing with natural disasters are being forced to revisit their business continuity plans.
Clouds are, by definition, insubstantial, but when services "somewhere out there" go pear-shaped, the damage can be catastrophic.
A need for risk managers with specific skills in business continuity planning and disaster recovery.June 01, 2011
A need for risk managers with specific skills in business continuity planning and disaster recovery.
Amazon's outage should serve as a reminder that relying on the cloud for server space can have a business impact if something goes amiss.
As more organizations continue migrating to the cloud, what should information leaders at organizations be asking of their provider?
IT departments, when facing the possibility of a disaster, may want to take a page out of the U.S. military's playbook.
American and Russian officials recently met to discuss cybersecurity issues, such as collaboration among law enforcement bodies and the use of cyberweapons, the New York Times reported in its Saturday editions.
Just weeks after reports surfaced that foreign spies have penetrated the U.S. power grid lawmakers are now set to introduce a bill Thursday aimed at creating standards to protect the nation's critical electric infrastructure.
McAfee has launched a free Cybercriminal Response Unit (CRU), meant to be an "online 911" where cybercrime is diagnosed and treated.
The Pentagon has spent more than $100 million in the past six months repairing damage to its networks caused by cyberattacks, according to military officials.
Success in today's cybersecurity environment of inevitability will require a multidisciplinary approach and the critical success factor is leadership.
The news comes after a serious weakness was revealed last week in the MD5 cryptographic hash function.
Certification Authorities that have not moved to a more secure cryptographic hash function than MD5 have come under fire in the security world.
Research presented at the 25th Chaos Communication Congress in Berlin demonstrated how an attacker could impersonate any website, including those secured by the HTTPS protocol.
A simulation this week demonstrated the need for better collaboration among public and private security groups.
The scale of distributed denial of service attacks has grown 100-fold since 2001, leaving some ISPs with long outages.
SC Magazine Articles
- Was Spotify breached? Account info shows up on Pastebin
- Report: Ransomware feeds off poor endpoint security
- Researcher finds backdoor that accessed Facebook employee passwords
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- FBI investigating attack against computer networks at U.S. law firms
- Pros examine Mossack Fonseca breach: WordPress plugin, Drupal likely suspects
- First Choice Credit Union files class-action suit against Wendy's over breach
- Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts
- Researchers spot Android Infostealer disguised as Chrome update
- Researchers spot mobile malware competition on the black market
- Judge ruled go ahead for claims of phone hacking against UK tabloid