Rep. Ted Lieu (D-Calif.) is calling on the Federal Communications Commission (FCC) to accelerate its investigation of the SS7 flaw.
The fish and wildlife agencies of Washington, Oregon and Idaho have temporarily suspended the sale of hunting and fishing licenses and tags after the vendor operating their online licensing system was apparently breached.
U.S. CIO Troy Scott promoted a $3 billion proposal to modernize government technologywhile speaking at an annual summit.
The interim boss of GOV.UK's Verify service is set to look for ways to use the identity-confirmation tools outside of central government.
Juniper confirms exploits leaked by the Shadow Brokers group appear to affect its firewalls, but has not yet patched the vulnerabilities.
The threat from ransomware continues to grow and the situation will only get darker before mitigation efforts prove reliable and the miscreants move on to another attack vector, according to a panel of cybersecurity experts gathered in Manhattan on Wednesday for the Dell Data Security Ransomware Roundtable.
Five suspected cyberthieves have reportedly fled Thailand after allegedly stealing approximately $350,000 in cash from 21 malware-infected ATMs operated by the state-run Government Savings Bank (GSB).
The government of Singapore is to shut off access to the internet of government agencies in an effort to preempt a cyber-attack or a data breach.
Code leaked by the Shadow Brokers group has set off calls from security researchers and tech groups for a national conversation about vulnerability disclosure policy.
In a revision of its policies, the U.S. Department of Health and Human Services' Office for Civil Rights has instructed its regional offices to place more of an emphasis on investigating smaller health-care data breaches that affect fewer than 500 individuals.
Visiting a 'forbidden' website is now punishable with a three-year jail term in India - even without downloading anything. NordVPN predicts a surge of VPN subscriptions in India by Internet users to protect online freedom.
Although a ransomware attack hit the city of Sarasota, Fla. in February, owing to an ongoing criminal investigation, details of the attack are only now being revealed.
France and Germany discuss 'tapping' encrypted end-to-end networks such as WhatsApp and Skype
NIST issued a far-reaching request for information, seeking cybersecurity suggestions from the private sector on a range of topics.
Belgian security officials reportedly turned to the National Security Agency (NSA) during an investigation that led to an accused Paris terrorist.
Snowden documents were published Friday, strengthening evidence that code leaked by the Shadow Brokers contains zero-day exploits used by the NSA.
Updated! As it considers classifying the electoral system as critical infrastructure, the U.S. government has pledged to provide states with federal assistance to help manage voting cyber risks and taking additional steps to quell fears the election this fall could be hacked.
China launched an orbital carrier rocket early Tuesday morning carrying the 'Micius' satellite, believed to be the world's first quantum satellite.
The persona known as Guccifer 2.0 published DCCC documents related to Florida primaries that provide detail into a re-districting effort that the hacker says shows congressional primaries are "becoming a farce."
The European Commission to looking to tighten its regulatory grip on US-based tech companies which are slowly replacing traditional telcos in the services they provide.
Roman Valerevich Seleznev, a Russian charged with hacking into servers and global carding forum sites resulting in $170 million in phony credit card purchases, will face a federal jury this week.
The U.S. Department of the Interior must update its access controls to meet current standards, according to an inspector general report.
The EPA has 30 systems that contain personally identifiable information (PII), according to the At a Glance summary of the inspector general's report.
The fallout from the hack into the DNC continues as it is now being reported that celebrities, C-suite executives and other high-profile donors to the Democratic party were also ensnared.
Major partners in the controversial nuclear power plant at Hinkley Point have been accused in American courts of attempting to steal US nuclear technology.
The Israeli Knesset waits on the passage of a bill which would see the amalgamation of Israel's cyber-defences into one central authority
As the FBI investigation into the hack of the Democratic National Committee broadens, it is being reported that the private email accounts of Hillary Clinton and more than 100 Democratic officials also have been breached.
The White House on Monday unveiled its finalized Federal Source Code policy, designed to encourage federal agencies to share code with each other, as well as the open-source software development community.
Spyware that was recently found to have infiltrated Vietnam Airlines has also embedded itself in the website operations of various Vietnamese institutions, warned cybersecurity firm Bkav, the Vietnam News Agency reported.
A group of four banks in Australia want customers to be able to use the banks' own mobile apps when conducting financial transactions with Apple Pay.
Estonia power company joins European network for cyber-security to improve its cyber-resilience.
European privacy groups have voiced opposition to a planned surveillance data project that would significantly expand the technology capabilities of Romania's domestic intelligence service.
The cyberespionage group identified as Strider by Symantec researchers is as sophisticated a threat as any known APT in history -- including Duqu, Flame, The Equation Group and Regin -- according to an analysis by Kaspersky Lab.
The online retailer has agreed to pay the penalty and to upgrade its data security practices.
Symantec yesterday disclosed its discovery of a cyberespionage group called Strider, which appears to be targeting mostly Russian entities with spyware attacks that bear the hallmarks of a sophisticated nation-state operation.
Lavabit founder Ladar Levison warned a Def Con audience that there's no law on the books protecting privacy.
The number of vulnerabilities in the federal government arsenal hovers in the dozens, Columbia University Senior Research Scholar Jason Healey told a DEF CON 24 audience.
NATO's recent proclamation that cyberspace is an official domain of warfare, along with Russia's reported cyberaggressions against the U.S. and Ukraine, raises interesting questions about how one can responsibly manage cyberwarfare.
Advocate Health Care will pay $5.55 million for a breach that led to the exposure of personally identifiable information of four million patients.
Russian hacking groups believed responsible for the Clinton hacks may not be the Russian state but may be silently condoned by it.
Two independent cybersecurity researchers took the stage at Black Hat to diagram how groups possibly controlled by the Iranian government are targeting dissidents.
Senators ask Sen. Ted Cruz (R-TX) to hold a hearing that examines Donald Trump's Russia comments entreating Russia to "find the 30,000 emails that are missing."
Citizen Lab researchers spotted a malware operation, dubbed Group5, targeting "well connected" Syrian opposition.
F-secure has linked the use of a Remote Access Trojan, to a recent ruling in the Philippines vs. China territorial dispute.
The fallout at the Democratic National Committee (DNC) over the leak of nearly 20,000 stolen emails continues with the announcement that three more top staffers will be exiting.
The Social Security Administration has instituted new security measures, but the step may do little to thwart cyberthieves.
Economic uncertainty following the Brexit vote is creating the perfect conditions for cyber-fraud, according to KPMG's Fraud Barometer.
New research on the Democratic Congressional Campaign Committee (DCCC) breach was likely the work of the Fancy Bear APT group, the same Russian intelligence-linked hackers responsible for intrusions at the DNC.
What a researcher flagged as a trove of email and password login credentials ofNASA employees likely reflected an attempt by an underground equivalent of script kiddies trying to make quick money by recycling old compromises.
A 40-year-old Nigerian national and alleged online scam artist, accused of bilking his victims out of more than $60 million, was arrested in Port Harcourt, Nigeria in a joint operation.
The U.S. Department of Commerce opened registration for Privacy Shield certification.
The U.S. Department of Homeland Security (DHS) is attempting to eliminate the guess work for organizations when it comes to reporting a cyber incident by issuing a "how-to" guide.
North Korean hackers are believed to be the culprits behind a phishing attack on nearly a hundred South Korean diplomats, security officials and journalists.
The Justice Department's national security division is looking into a breach of the Clinton Campaign's computer network.
The FBI has posted a "Cyber's Most Wanted" list to appeal to the public for help in nabbing a number of criminals wanted for crimes involving computers, bank fraud and other nefarious online schemes.
The American Civil Liberties Union of Utah and the ACLU have taken to the courts to challenge the DEA's warrantless access of private prescription records from the Utah Controlled Substance Database.
Eighty-three percent of fraudulent money transfers reported to the FBI as the result of business email compromise scams are wired to banks in China and Hong Kong, CNN reported, following an FBI presentation at the International Conference on Cyber Security.
The FBI is looking for candidates to fill its brand-new position of senior-level data scientist, a role requires specialization in big-data analytics and whose responsibilities include serving as a top advisor and consultant to Cyber Division executives.
An Arab-American policy organization has joined with civil liberties and privacy groups to address domestic surveillance policies that target Arab American and American Muslim communities.
To enhance the use of its web portal, gov.uk, the U.K. government is testing the use of its subscribers' social media logins as an authentication method.
Government service providers will be required to phase out the use of SMS-based two-factor authentication (2FA) as the result of new guidelines from the National Institute of Standards and Technology (NIST).
A new Facebook app from Hillary Clinton's presidential campaign which invites users to "Trump Yourself" could contain privacy implications.
Counsel for Lauri Love and the US government rehearsed their final arguments as Tom Reeve reports from Westminster Magistrates' Court yesterday.
Members will discuss and examine the challenges of balancing privacy and fighting cybercrime.
The federal government would greatly benefit from implementation of Internet of Things technology, but few agencies are taking advantage, says the Center for Data Innovation.
A flood of information has emerged that connects GOP presidential nominee Donald Trump to a questionable cast of characters who are linked to Russian interests.
The email dump underscored the holes in security and privacy yawning at many organizations and the very real possibility that nation-states like Russia have upped their game to manipulate the democratic process.
The hackers responsible for reproducing seven master keys used by the TSA to open locks commonly placed on luggage have now duplicated an eighth key in an effort to demonstrate the dangers of digital key escrow policies.
Fearing a Russian cyberattack, Estonia is reportedly negotiating with the U.K and Luxembourg governments to store citizen data in the U.K.
The ACLU of Illinois applauded Governor Bruce Rauner's Friday signing of legislation regulating stingray use as a "measure that increases transparency."
How has Anonymous avoided being labeled as a terrorist group? That is a serious question that was proposed by an anthropologist during the HOPE Conference in New York City.
Three defendants were charged in federal court on Friday for their role in a global telecommunications fraud conspiracy that compromised mobile phone users' accounts and cloned their cell phones to make unauthorized illegal international calls.
A man sitting in jail on charges of sex trafficking was ordered by a federal judge to unlock his iPhone, but so far his attorney has succeeded in blocking the order on constitutional grounds.
WhatsApp messages of military officers involved in Turkey's attempted coup were published by the country's state-run media outlets.
The FBI's process for prioritizing cyberthreats is too slow and subjective, hindering its ability to optimize allocation of resources to address these dangers, according to a new report from the DoJ's Office of the Inspector General.
Ransomware threats targeting government IT systems nationwide at the state and local level are steadily increasing.
Cooperating with law enforcement is "our basic civic responsibility," BlackBerry CEO John Chen told reporters at a media Q&A at the BlackBerry Security Summit in New York.
A Ukrainian man was arrested Wednesday in Poland for allegedly owning and operating one of the world's largest BitTorrent distribution sites.
A group claiming to be a far-right Ukrainian nationalist group has attempted to blackmail the Polish ministry of defence.
After a four-day long DDoS assault, the Library of Congress announced its computer systems have returned to normal.
The Wassenaar Arrangement for regulating the international arms trade is threatening to choke the international cyber-security community and ultimately make us less secure, an audience at RSA Singapore heard.
Google's latest transparency report displays a continued increase in data requests the company received from government authorities.
Turkey blocked access to WikiLeaks after almost 300,000 emails from the Justice and Development Party (AKP Party) were released Tuesday.
Guccifer 2.0 documents reveal information about prominent donors to the Democratic party, including Hollywood celebrities Steven Spielberg, Tom Hanks and David Geffen.
ISA President Larry Clinton urged lawmakers to treat cybersecurity "with a greater sense of urgency," saying in a release that the economics of cybersecurity need to be better integrated into policies.
The White House is discussing proposals with U.S. allies that could allow foreign governments to serve search warrants requesting email and wiretap information to US companies.
The Carbanak cybergang which facilitated the heist of $1 billion from banks around the world last year, was linked to the Russian security firm Infocube.
The former St. Louis Cardinals baseball executive who illegally hacked into the Houston Astros' computer systems in order to gather intelligence and obtain an unfair advantage was sentenced in Houston yesterday to 46 months in federal prison.
Three suspects were arrested after a network of Eastern European and Russian cybercriminals used malware to steal $2.5 million in cash from dozens of machines around the country.
NATO CCDCOE urged to promote cooperation in training of cyber-defence experts as the cyber realm declared a theatre of war.
The UK rail network has been hit by cyber-attacks at least four times in the past 12 months.
DARPA are starting a competition to help automate defence and see how artificial intelligence can combat cyber-threats.
As the Turkish government allegedly blocked access to social media during what was reported as a military coup, The Tor Project said Friday that people can use the Tor browser to reach Facebook, Twitter and the free Internet.
A debate in the House of Lords has unearthed some previously unnoticed powers included in the much maligned investigatory powers bill including the desire to break end-to-end encryption.
The demand for a cybersecurity component that can be deployed to protect U.S. military infrastructure and combat forces is so strong that Cyber Command will begin deploying its cyber troops even before the complete force is trained and staffed.
Silicon Valley tech sector leaders released a statement expressing dismay at the possibility of Donald Trump becoming president.
Guccifer 2.0 leaked additional documents purportedly pilfered from the Democratic National Committee and which included donor information and a file on former Alaska Governor Sarah Palin, according to The Hill.
Privacy advocates hailed the Second Circuit's ruling as a victory for Microsoft and, if it holds, will likely inspire confidence among privacy advocates and European privacy regulators about the fortitude of the U.S.'s privacy posture.
An interim report filed yesterday by the U.S. House Committee on Science, Space and Technology revealed gaping holes in the FDIC's cybersecurity posture and accused the financial institution of withholding documents pertaining to data breaches.
Researchers have found that the Maxthon browser sends sensitive data to a browser in Beijing and is prone to man-in-the-middle attacks.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- U.S. government extends offer to protect states from electoral cyberthreats
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought