Lancope has appointed Tom Cross as director of security research, Wells Fargo & Co. has named Rich Baich CISO, and other personnel announcements and corporate happenings.
HIPAA violations are becoming more common around the nation. To find the source of the problem you have to "follow the money."
The criminals behind the Reveton malware are using fake FBI scare tactics to entice victims.
Anonymous, WikiLeaks, DNSChanger, Stratfor, global cyber crime ring...and other breaking news.
An individual has no intrinsic, inalienable right to leave his own system unprotected if by doing so he puts others at risk.
The FTC has made major moves this year in its fight against cyber crime, and if enterprises and organizations aren't careful, they may be facing a team of the agency's investigators.
The FBI's cyber division has a new assistant director, Joseph Demarest, who formerly served as assistant director for international operations.
A Russian national is in custody in Newark, N.J., facing charges of hacking into the web accounts of several brokerages to initiate sham stock trades that allegedly netted $1 million.
A federal judge has approved a request to extend the use of DNS servers, giving enterprises more time to remove the insidious DNSChanger trojan.
While anti-malware strategies and new technology may stump cyber criminals, it's public collaboration they should fear.
News briefs: The latest from the PCI Security Standards Council, Google, Anonymous, Facebook and others...
Hackvistim is not just resulting in high-profile breaches and data loss, it's also shedding light on the neglect many organizations are showing security.
A message purportedly sent from the FBI Anti-Terrorist and Monetary Crimes Division is making its way to inboxes, threatening recipients that they will be arrested if they do not reply back.
Security professionals must establish relationships with their local FBI agents, and relevant information-sharing bodies, as well as have a plan of action before being hit with a breach.
Microsoft has prevailed in its civil case against the operators of the Rustock botnet, which in its heyday controlled a network of more than a million computers.
A security and privacy expert explains how cracking voicemails takes little skill.
No anti-virus product worth its salt uses the "one malicious program, one signature" model today.
Good viruses and trojans? Legal malware? Does (or should) AV detect the FBI's spyware?
Our G-men and G-women are going after the bad guys.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries
- PagerDuty requires password change for all customers following breach
- Cisco: Attackers innovating, evading defenses in first half of 2015
- Does Windows 10 Wi-Fi Sense spell end of private wireless networks?