The leaders of a group of tech industry associations asked the presidential candidates to strengthen the United States' cybersecurity posture, and attached a "Technology Sector Presidential Platform" that lays out recommendations.
Sen. Ron Wyden is planning to introduce legislation to reverse proposed amendments to Rule 41 within days, an aide to Sen. Wyden told SCMagazine.com.
Marcel Lehel Lazar, better known as the Romanian hacker Guccifer, has claimed in an interview with NBC News that he didn't just publicly expose U.S. presidential candidate Hillary Clinton's email address, but actually broke into her email server.
Documents declassified on Tuesday reveal that the Justice Department aggressively sought to impose administrative penalties on whistleblowers, rather than pursue criminal penalties.
The Swiss defense department was hit with a cyber attack.
A judge in Brazil ordered mobile phone operators to shutter the WhatsApp chat service for three days.
The long-besieged Privacy Shield agreement proposed by U.S. and European officials faces a new round of challenges following recent decisions by the U.S. Foreign Surveillance Intelligence Court and the Supreme Court.
House Oversight Committee asked SSA Acting Commissioner Carolyn Colvin to hand over the unredacted version of a penetration testing recently done at the agency.
After an investigation confirmed that data was exported during a December breach of the DNC voter file system but cleared the Sanders campaign of wrongdoing, the presidential hopeful withdrew a lawsuit it had filed against the DNC.
A contentious amendment to an international export treaty has been causing an uproar in the security communities, reports Karen Epper Hoffman.
Hacking a connected car in Michigan could warrant a life sentence behind bars if recently proposed legislation is passed into law.
Belgium's minister of defence, Steven Vandeput has stated the importance of investing in technology for national security.
Several ISIS hacking groups announced that they have joined forces to form a large hacking group.
U.S. Chief Information Officer Tony Scott Tuesday hinted his office may be working to help guide federal agencies to adopt "bimodal IT."
In a letter to the OMB, Senate Homeland Security Committee Chairman Ron Johnson and ranking member Tom Carper asked the agency's director Shaun Donovan to complete changes to a privacy and cyber policy framework.
The U.S. House yesterday passed the Defend Trade Secrets Act of 2015, which creates a single U.S. standard for protecting companies from intellectual property theft through civil recourse against the offending parties in federal court.
The director of CERT UK laid out some of the problems facing UK cyber-space and outlined what cyber-security could do to help fix them.
A defense authorization bill could split off the U.S. Cyber Command from under the direction of U.S. Strategic Command and the NSA.
Cybercriminals are strengthening their DDoS attacks with more amplification and new methods to refine their botnets.
Automakers, Uber, Google form Self-Driving Coalition for Safer Streets as GAO releases vehicle cybersecurity report
Automakers form join forces in the Self-Driving Coalition for Safer Streets coalition one day after the GAO released auto cybersecurity report.
The House Wednesday passed the Email Privacy Act (EPA) 419-0, a reformation of the aging Electronics Privacy Act (ECPA) and drew immediate praise from rights groups.
Lawmakers are requesting an addendum to a defense authorization bill to mandate specialized training for U.S. cybersecurity troops engaged in war games.
The Federal Bureau of Investigation won't share the method that was used to unlock an iPhone 5c used by one of the San Bernardino shooters because the mechanism belongs to the third party who cracked the phone.
Though deeply unpopular in some circles, a new YouGov poll has shown broad approval for the enumeration of government surveillance powers in the Investigatory Powers Bill.
More than two months after a federal judge ruled the U.S. must privately disclose the hacking technique the FBI used to identify patrons of the child porn site Playpen, lawyers have filed a motion urging the case be dismissed if the government does not comply or drop the charges.
The root of the problem with malicious smart city hacking lies in the fact that sensors typically collect 'raw' data and then merely pass it on.
The U.S. government is mulling ways it might disclose the number of Americans who have been caught up in government surveillance under the Prism program, set to expire in 2017.
The Justice Department told a federal court that it was dropping its case against the tech giant after it received a passcode for the device from an unnamed source.
Rep. James Langevin wrote an open letter to the Food and Drug Administration's (FDA) praising draft guidance that would strengthen the cybersecurity of medical devices.
Pro-democracy activists in Hong Kong are being targeted by a new variant of Poison Ivy, a malware package that previously hadn't seen an update in six or seven years.
The two men responsible for the SpyEye banking trojan, used to steal user information from financial institutions, were sentenced to a combined 24-1/2 years in prison.
MacKeeper Security Researcher Chris Vickery claimed to have discovered 93.4 million Mexican voter registration records.
Published reports are using an odd methodology in an attempt to decipher exactly how much the Federal Bureau of Investigation (FBI)paid to unlock the iPhone 5c belonging to one of the San Bernardino terrorists.
A coalition of industry groups representing some of the largest tech companies in Silicon Valley penned an open letter to Sen. Richard Burr (R-NC) and Sen. Dianne Feinstein (D-Calif.).
A federal district court judge has ruled that an Eastern Virginia magistrate overstepped her authority when granting the FBI a warrant to collect data from the user of a child pornography site, because the data resided on a computer in Massachusetts, outside her jurisdiction.
Filipino authorities Thursday confirmed the arrest one of three people believed to be responsible for breaching the COMELEC website.
Australian Prime Minister Malcolm Turnbull confirmed that the Australian Bureau of Meteorology was indeed a target of a cyberattack last year.
In a declassified ruling, a federal judge of the Foreign Intelligence Surveillance Court (FISC) ruled that the FBI's search of Americans' emails without a warrant during criminal investigations is not contradictory to the Constitution or the FISA Amendments Act.
Americans are concerned that the FCC's Set-Top Box proposal, which will open the market to third-party vendors like Google, will compromise their privacy.
A federal judge has ruled that Ashley Madison class action plaintiffs must use their real names to continue lawsuit.
When Jamie Randall, CTO of the IASME Consortium, was asked to speak at yesterday's SC Congress Amsterdam on upcoming EU data protection regulation, he says that he, like many people, "promptly fell asleep".
Recent changes in Washington have led to CCOs fearing that they may be held personally responsible for the misconduct of their employers.
A malicious insider was handed a nine-year prison sentence and a $1.7 million fine for hacking into the computer system of his former employer Locke Lord.
The Senate Subcommittee on Emerging Threats will meet today to hear testimony on cybersecurity issues and funding from Department of Homeland Security and U.S. Cyber Command representatives.
Phineas Fisher, the hacker who claimed responsibility for breaching Hacking Team last year, published a how-to guide detailing his process in executing the attack.
U.S. and Russian officials will meet this week in Geneva to discuss cybersecurity issues though not as a restart of the Bilateral Presidential Commission, a State Department official told SCMagazine.com.
The Identity Theft Resource Center (ITRC) and IDT911 said that to date, the financial services, business, education, government and healthcare industrial sectors have experienced over 6,000 data breaches since 2005.
The Royal Canadian Mounted Police intercepted and decrypted around one million PIN-to-PIN BlackBerry messages,
Cybersecurity is the greatest threat since the atom bomb, said Apple co-founder Steve Wozniak.
The iPhone used by Syed Rizwan Farook, one of the shooters in the San Bernardino terror attack that left 14 people dead, was not found to contain any useful information, according to reports.
A U.S. federal appeals court ruled on Wednesday that the FBI did not violate the Constitution when it collected cell site location information without a probable cause warrant, in order to track the movements of multiple robbery suspects.
During a House committee hearing on Thursday, legislators questioned Internal Revenue Service Commissioner John Koskinen about measures taken to improve the agency's cybersecurity methods.
Lobbying firm The Fritts Group has contracted with General Motors to advocate for the introduction of self-driving vehicles on behalf of the Detroit-based automobile manufacturer.
A House subcommittee hearing Thursday examined state and local government preparedness in case of cyberattack on the U.S. electrical grid.
Experts are speculating that the FBI may be closely guarding a secret vulnerability in the Firefox browser that it can exploit for future law enforcement purposes, according to a Motherboard report yesterday.
Matthew Keys, a former social media editor at Reuters, received a two-year federal prison sentence for providing his username and login credentials to a hacker associated with the hacking group
Well before the FBI's recent demand that Apple give up the keys to the encryption used in an iPhone 5c, the bureau engaged in a similar effort.
During the last six months of 2015, Uber received 33 requests from regulatory authorities seeking trip data on more than 12 million drivers and riders.
A proposed California legislation imposing specific penalties for ransomware took a step forward yesterday when the state senate's Public Safety Committee passed the bill at a hearing featuring testimony from Hollywood Presbyterian Medical Center.
Lawmakers shot down California legislation seeking to coerce smartphone decryption by imposing a $2,500 penalty.
The House Judiciary Committee today passed the Email Privacy Act (H.T.699) by a 28-0 vote, a measure that would require a warrant for accessing anyone's electronic correspondence.
A cyberattack launched by a Russian APT group may have jammed Sweden's air traffic control capabilities, that was initially attributed to a solar storm.
Swedish military servers were used by hackers to launch 2013 attacks against U.S. financial institutions, according to reports.
A former employee of the Federal Deposit Insurance Corp. departed the agency with a storage device that contained data and information involving 44,000 FDIC customers.
The FBI and DHS has scheduled a series of unclassified webinars and threat briefings across the U.S. addressing the 2015 cyberattack against Ukraine's power grid.
Costa Rica will be undergoing an investigation on whether or not hackers interfered with its 2014 elections.
Privacy groups oppose proposed changes to an executive order that would relax limitations on the NSA in sharing surveilled communications information with other agencies.
The DHS Industrial Control Systems Cyber Emergency Response Team, or ICS-CERT, has issued security advisories on vulnerabilities in ICS technologies from Eaton Lighting Systems, Pro-face and Rockwell Automation.
German police Tuesday arrested the 22-year-old main suspect in a cybercriminal investigation spanning four countries.
If the U.S. military normally has one thing down pat it's knowing who is in charge at any given time. However, when it comes to handling a massive cyberattack on the country, the Pentagon is not quite sure who should be issuing orders.
Mossack Fonseca co-founder filed complaints with Attorney General's office in Panama and said the firm was hacked from Europe.
WhatsApp integrated the Signal Protocol into its online messaging service, delivering on a promise to provide end-to-end encryption to its users.
Between October 2013 and February 2016, 17,642 global businesses collectively lost $2.3 billion to business email compromise scams, according to the FBI.
Senate approved the Defend Trade Secrets Act, legislation that provides stronger protections for companies in protecting trade secrets.
The U.S. Department of Homeland Security, in collaboration with Canadian Cyber Incident Response Centre, issued an official ransomware alert.
Following the massive 2.6 terabyte leak from the Panamanian corporate service provider and legal firm Mossack Fonseca, a sentiment emerges among security professionals assessing the wreckage at the secretive firm.
Privacy advocates and digital rights proponents are leaning on the FBI to disclose the method it used to break into the iPhone of the San Bernardino killer, but the agency so far remains mum..
Ghost Squad Hackers claim to have taken down two websites belonging to Donald Trump.
Claiming that a revenge porn bill could stymie free speech, the Motion Picture Association of America (MPAA) urged Minnesota state lawmakers to include an "intent to harass" clause.
Marcel Lehel Lazar, the alleged hacker known as Guccifer who helped validate reports of Hillary Clinton's use of a private email account as Secretary of State, appeared in a U.S. courtroom on Friday after extradition from Romania.
A hacker known as The Jester, whose site became a target of a DoS attack, claimed he rerouted the assault to strike Mossad, but it's his site that is currently down.
Don't expect much action from Congress, it's an election year.
If Apple complies, the FBI would have the ability to compromise personal security when it wishes, says Ryan O'Leary, VP of Threat Research Center, WhiteHat Security. .
In cases where terrorist attacks are carried out state-side, it is vital that intelligence be obtained, says J.J. Thompson, CEO, Rook Security.
As Washington gets distracted, expect more activity at state legislatures on cybersecurity and privacy, reports Steve Zurier.
The new data transfer mandate presents challenges for enterprises, but global trade depends on its widespread adoption, reports Larry Jaffee.
As Apple and the FBI lace up their gloves for a fight that makes Ali vs. Frazier look like a schoolyard brawl, privacy and security hang in the balance. Teri Robinson reports.
U.S. Senator Gary Peters (D-Mich.) is pushing to establish a national automotive cybersecurity laboratory.
In an opinion piece for The Telegraph newspaper, William Hague, the Conservative former Foreign Secretary in the UK, says the latest Brussels terrorist attacks shows the need to crack terrorist communications.
David Kent, founder of networking website Oilpro.com, was brought up on charges relating to computer hacking and wire fraud.
New standards and cyber-security strategy approved in Ukraine to thwart Russians hacking infrastructure as Russian software purchases halted.
Hackers reportedly accessed computer networks at U.S. law firms, including Cravath Swaine & Moore LLP and Weil Gotshal & Manges LLP.
The DOJ filed a sealed motion requesting a federal judge reconsider an opinion that the FBI must reveal code used to subvert the Tor network's anonymity protections.
The tentative naming of the Israeli firm Cellebrite as the muscle behind the FBI's ability to hack into the iPhone used by San Bernardino, Calif. shooter Syed Farook without help from Apple, has brought this little known company into the spotlight.
President Obama Tuesday extended the duration of the economic sanctioning powers that were put in place last year to combat cyber threats.
Russia and the US are to revive a series of bilateral agreements on cyber-defence including the world's first non-aggression treaty on IT
Officials say the Iranian man charged with hacking into a New York dam used a technique called "Google dorking" to identify the vulnerable system.
The FBI might be pressed into providing Apple with the details of how its third-party hacker - now reportedly Cellebrite - will break into an iPhone so Apple can modify its security vulnerability.
Admiral Michael S. Rogers, commander of the U.S. Cyber Command secretly visited Israel last week to discuss cyber security issues.
SC Magazine Articles
- Updated: Gmail, Yahoo email credentials among millions found on the dark web
- Pwnedlist vulnerability exposed 866M accounts
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Turkish fascists claim responsibility for Qatar bank data breach
- Action Fraud warns of new wave of Lizard Squad DDoS attacks
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- Report: Ransomware feeds off poor endpoint security
- Android/Clicker.G malware found in Google Play apps
- Tech groups present 'Technology Sector Presidential Platform' to candidates
- Hacker pranks 'stupid' Locky distributor, but ransomware threat keeps growing
- Spearphishing attack nets $495K from investment firm
- Guccifer hacker boasts he hacked into Hillary Clinton's email server