The former cybersecurity chief at the U.S. Department of Homeland Security is now the head of ICANN, a primary internet governance organization.
After much speculation, President Obama confirmed Friday that a new White House office will be dedicated to coordinating digital security efforts, to be led by a yet unnamed "cybsersecurity coordinator."
Bad economic times are when good companies have the opportunity to become great companies, IBM's Brian Truskowski told an audience at the RSA Conference.
Lt. Gen. Keith Alexander, director of the National Security Agency/Chief Central Security Service, used his keynote presentation at the RSA Conference on Tuesday to dispel rumors that the NSA seeks to be in charge of cybersecurity in the United States.
Just days into his new job, Symantec CEO Enrique Salem is calling for a colossal shift in the way vendors and end-users approach information security.
Some parts of the Rockefeller-Snowe bill make sense, while other parts may cause unexpected consequences.
To protect the country's information networks, President Obama plans to appoint a cyber adviser, initiate new research and development and increase collaboration with the private sector.
Many experts are optimistic that the Obama administration will take positive measures in cybersecurity, reports Angela Moscaritolo.
A federal judge has lifted a temporary injunction that denied three college students from presenting their subway payment hack research at the recent Defcon show.
A privacy watchdog hopes a judge's decision to pull a Defcon presentation doesn't impede future security research.
The U.S. Senate on Wednesday passed the latest version of the Identity Theft Enforcement and Restitution Act.
The millionaire founder of anti-spyware company Webroot has been discovered dead, two weeks after he went missing.
A DNS design flaw, which could have allowed remote attackers to silently hijack web sessions, prompted Tuesday's release of an unprecedented multivendor patch.
A new website is designed to create a social network for white-hat hackers.
The Department of Homeland Security's second massive cybersecurity exercise has revealed improved preparedness across IT infrastructures and government agencies, compared to the first "Cyber Storm" in 2006, according to the acting director of DHS's National Cybersecurity Division.
Heart patients beware: If you feel a sudden jolt to your chest, it may be that someone has hacked into your pacemaker, according to recent research that investigated security problems affecting pacemakers and implantable cardioverter defibrillators (ICDs).
A project funded by the Department of Homeland Security promises to give security researchers a new way to kill botnets and targeted malware attacks before they infect computers.
Two Republican congressmen from Illinois have proposed legislation that would update the Social Security card for the age of cybercrime.
After a brief hiatus, new variants have appeared in the wild of Trojan.Mebroot, a rogue rootkit discovered in December attacking the Windows Master Boot Record (MBR), Symantec has warned.
Fortinet researchers have discovered a new socially engineered Symbian OS worm they say is actively spreading on mobile networks as users unwittingly send the malware to their unit's entire address book.
Script-based attacks that cycle through multiple exploits and target trusted websites, increasingly sophisticated botnets, and cyberespionage that uses phishing to steal terabytes of data head SANS Institute's Top 10 list of 2008 security menaces.
California has merged two major departments focused on information security and privacy into a single agency that will battle electronic identity theft.
Cyberattackers are exploiting the assassination of former Pakistani Prime Minister Benazir Bhutto to spread malware, according to researchers at numerous anti-virus vendors.
Our technology experts have made their choices for the best products of 2007 from among the dozens of entries that were subjected to thorough group tests and reviews during the year at the SC Lab. Click on this article to view a pdf of the BEST OF 2007.
A rise in international cyberspying will pose the most significant threat to the national security of the United States in 2008, according to a report from anti-virus vendor McAfee.
Less than a week after disappearing from the web, the Russian Business Network (RBN) has cut short its re-emergence in China.
Italian authorities are holding the founder of WabiSabiLabi, an eBay-like online marketplace for buying and selling zero-day vulnerabilities.
McAfee told organizations not to lose any sleep over reports that al Qaeda would target Western websites in a mass-cyberattack this Sunday.
Whether it's Hillary Clinton, Fred Thompson, Rudy Giuliani or Barack Obama -- or any of their competitors -- who is sworn in on Jan. 20, 2009, the next president of the United States will have a list of cybersecurity recommendations on their desk.
Clothing retailer Gap Inc. revealed that a laptop containing the Social Security numbers of 800,000 job applicants was stolen from a third-party vendor. The laptop contained info of job applicants who applied to the company's Old Navy, Banana Republic, Gap and Outlet stores. The vendor, not identified by Gap, contacted law enforcement authorities about the breach. The data was not encrypted.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure