The Windows-based trojan Remtasu has switched tactics, disguising itself as a malicious application for accessing people's Facebook account credentials.
The Office of the Inspector General (OIG) said Colin Powell and Condeleeza Rice both used private email for classified information and a heavily redacted email from John Kerry showed that he likewise used a private email account
Symantec has discovered a spam campaign targeting Portuguese-language computers specifically focusing on companies based in Brazil with the goal of stealing email accounts in order to access sensitive corporate information.
Aimed at manufacturing, telecommunications, and financial services sectors, Dridex has reemerged after a post-holiday slowdown.
For its email needs, the Cavaliers Operating Company in Cleveland got an assist to avoid the junk folder. Greg Masters reports.
Unit 42 researchers said Scarlet Mimic is behind attacks against minority rights activists that began more than four years, though they've shifted both their tactics and the malware used.
A Swiss digital surveillance law that has rankled online privacy advocates will now subjected to a public vote, after opponents collected enough signatures to challenge the legislation.
An aircraft components designer and a Belgian bank were the latest victims of the business email compromise (BEC), prompting the IC3 to issue an alert.
Classified information on a server belonging to Hillary Clinton may have been hacked by foreign adversaries, ex-Pentagon chief Robert Gates said.
Having recently taken on the studio boss role at Relativity Studios, House of Cards star Kevin Spacey fears a hack similar to that of Sony Pictures will occur again.
A crude but dangerous email-based social engineering scam has been targeting small-to-medium-size businesses in the U.S., U.K. and India since early 2015, the Symantec Security Response blog warned today.
Cisco's Annual Security Report shows SMBs to be under-defended and recommends collaboration as the way to combat the bad guys.
Symantec is investigating a pump and dump stock spam campaign that used the long-lived W.32 Waledac botnet to target a marijuana farming company possibly generating thousands in illegal profits.
Cybercriminals wasted no time in exploiting the media attention focused on the passing of rock icon David Bowie.
Despite an encrypted email service on BlackBerry smartphones, forensic investigators in the Netherlands said they can read encrypted messages sent on the devices.
Researchers at IBM X-Force have spotted an aggressive infection campaign targeting major Japanese banks.
Recent warranty fraud attempts on Fitbit have occurred in the last few months, with customer service being barraged with emails from customers claiming that their device is not working as expected and demanding replacements.
Time Warner Cable (TWC) is blaming a phishing attack conducted on one of its vendors for a data breach that may have resulted in 320,000 TWC customer emails and other personal information being stolen.
Social media users are largely unaware of the value to attackers of personal information they are freely sharing with friends and strangers alike, warns Kaspersky Lab.
We ended up last time with an introduction to the use of STIX and TAXII for threat hunting. Our last topic was STIX indicators so that's a good place to start this time.
Whaling attacks eschew technical sophistication in favour of a good old fashioned confidence trick and according to cyber-security company, Mimecast, they're on the rise.
The security experts from ESET who report at We Live Security (WLS) took out their crystal ball and predicted the following cybercrime trends for the coming year.
Google beta testers are logging on without passwords, utilizing a new method that authenticates by responding to a notification sent to a smartphone.
Tempting collection of free Christmas images lures 60,000 users into Angler exploit kit sleigh ride. Destination: CryptoWall 4.0.
The comeback was 16 years in the making, but macro malware is once again on security professional's radar in a big way impacting at least 100,000 people since it began its resurgence earlier this year, according to Intel Security
The Nemucod trojan is on the rise and being used to spread Teslacrypt ransomware via phishing campaigns, although the silver lining is not as many people are being victimized this time around.
Two security industry pros said its time for organizations to make sure their workers understand the importance of cyber security and actively take part in defending their company.
An email sent by Twitter late last week warning some users that they may be targeted by state-sponsored hackers has elicited more confusion than concern.
Earlier this year, Lee Philip Rees of Roath, Cardiff was found guilty of computer hacking, distribution of indecent child photos and blackmail.
A former U.S. State Department staffer pleaded guilty to a variety of crimes related to a sextortion scheme he was operating.
Sign up to our newsletters
SC Magazine Articles
- CISO salaries and demand for cyber-skills skyrockets, surprising no-one
- Skype targeted by T9000 backdoor trojan
- Student SSNs exposed in University of Central Florida breach
- Malwarebytes says sorry for multiple AV bugs, still unpatched
- Ransomware and POS attackers to zero in on small businesses, retailers
- Cryptowall has been a cash bonanza for criminals, failure for cops
- IRS hackers try to use stolen SSNs to generate E-file PINs
- Report: Pros urged to roll out IT projects before they are security-ready
- Security issues plague web dating software
- Employees mishandle data, violate HIPAA in Washington State Medicaid breach