Published reports are using an odd methodology in an attempt to decipher exactly how much the Federal Bureau of Investigation (FBI)paid to unlock the iPhone 5c belonging to one of the San Bernardino terrorists.
Not all hackers are evil, some of them do fight to keep the internet safe. Most of the good guys do it for the bounties offered by major brands and net companies.
Finland's foreign ministry computer network has been infiltrated by spies, foreign minister Erkki Tuomioja has revealed to the media.
UK graduate student Lauri Love is using a new tactic in his attempt to fight extradition to the U.S.
China's U.S. ambassador warned that any sanctions imposed against Chinese interests could negatively impact Chinese President Xi Jinping's upcoming Washington visit.
This month's news briefs cover a preliminary settlement Sony will bear for the exposure of 77 million customers, and more.
The Russian Foreign Ministry lodged a protest with the U.S. Embassy in Moscow, demanding the return of Roman Seleznev.
The 16-year-old boy faces multiple counts of second-degree computer theft for unlawfully accessing and altering data and one count of hindering apprehension.
The Chinese government is pushing government-owned banks to replace IBM servers with those made locally, according to reports.
Five members of the People's Liberation Army were indicted for stealing trade secrets from several large U.S. companies including Alcoa.
Jose Bautista allegedly confessed to his high school principle that he changed his grades and those of four classmates.
Considering a number of high-profile companies have fallen victim to Twitter account hijacks, prompting the service to install additional protections, a bizarre string of tweets sent by Chipotle Mexican Grill's account on Sunday appeared to fit the pattern of a hack.
A congresswoman and a senator want to reform the 30-year-old federal anti-hacking law known as the Computer Fraud and Abuse Act. They were spurred on by the death of activist and Reddit co-founder Aaron Swartz.
While scenarios in which network-enabled medical devices, such as pacemakers, are hacked has shown to be possible, the U.S. Food and Drug Administration believes the real-life risk is growing.
The "PlaneSploit" application was three years in the making, and is able to remotely attack flight management systems, though the program was built to only work on virtual aircraft.
Security firm Seculert is tracking two versions of the threat: one which is targeting Japanese organizations and the other directed, ironically, toward Chinese journalists.
The personally identifiable information found on social networks are a gateway for hackers to get access to the heart of the information they truly desire.
The university has started to notify thousands impacted by the incident, which dates back to at least June.
Employees at an international airport were targeted in a multifaceted attack that beat two-factor authentication, and included form-stealing and screen-grabbing functionality.
The whistleblower site, in the midst of publishing revelatory emails belonging to intelligence company Stratfor, has signed up with DDoS mitigation service CloudFlare.
The hacks of the tomorrow may target devices one never thought could be susceptible to compromise, like dishwashers and refrigerators. But a hypothetical glimpse into the future may make you think differently about what's to come.
Two research presentations set to be delivered next week in Las Vegas will shine the spotlight on the vulnerability of smart meters.
Joshuah Witt, 35, the final member of a Seattle crime ring that combined hacking with old-fashioned breaking-and-entering, has been sentenced to just under eight years in federal prison, federal prosecutors announced Friday.
The FBI monitored an underground credit card forum to net two dozen alleged cyber criminals, a takedown that authorities believe prevented $205 million in losses.
A U.S. Circuit Court of Appeals ruling has said employees who violate their organization's user policies do not violate the federal Computer Fraud and Abuse Act (CFAA).
A military dating website, which a band of hackers claimed this week to successfully infiltrate to pillage members' personal information, was not actually hacked, according to its administrator.
Until last year, lost and stolen laptops were to blame for the largest percentage of breach types. Now, hacking has claimed the top spot.
The federal Securities and Exchange Commission has charged a Latvian man with participating in a scheme that manipulated the value of more than 100 New York Stock Exchange and Nasdaq stocks.
HP LaserJet printers do not validate the origin of remote firmware updates before applying them, meaning anyone could potentially reprogram them to access a corporate network -- or even light them on fire.
SC Magazine Articles
- Report: Ransomware feeds off poor endpoint security
- PCI DSS version 3.2 release extends multifactor authentication requirement
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- New site on dark web offering one-stop ransom services
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- Report: Ransomware feeds off poor endpoint security
- Pros examine Mossack Fonseca breach: WordPress plugin, Drupal likely suspects