Verizon will start sharing user data, including the use of a controversial code tracker, with the AOL Advertising Network.
The Ponemon Institute and Hewlett Packard Enterprise released their annual cost of cybercrime study, the result sof which indicted that companies spent more this year to combat digital threats.
Five Russian banks that experienced distributed denial of service (DDoS) attacks Sept. 26 had been warned in advance by the General Directorate of Security and Information Protection of the country's Central Bank.
Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.
Our working hours may grow longer, more demanding and more exposed as the Internet of Things (IoT) continues its fast evolution.
Insurance to cover loss after a data breach is becoming mainstream, but buyers must investigate the options, reports Jesse Staniforth.
Honeypots are really useful for collecting security data for research, especially around botnets, scanning hosts, password brute forcers, and other misbehaving systems. They are also the cheapest way collect this data at scale.
Microsoft released a statement on Tuesday that addressed the feedback and privacy concerns of Windows 10 data collection.
Women didn't increase their numbers in security over the past two years, according to a report released by (ISC)², which found that women in the security workforce held steady at 10 percent.
The OpenSSL Project said it has updated its security policy to include a "Critical" severity level.
A Tripwire study says UK IT professionals have more confidence in the cyber security literacy of their corporate board than their US counterparts.
Paul Kurtz, CEO of TruSTAR Technology and former cybersecurity advisor to the White House, discusses the federal government's cybersecurity problems, in the wake of the data breaches at the Office of Personnel Management (OPM).
Facebook announced that it will now support OpenPGP's standard elliptic curve cryptography (ECC) public keys
Intel Security studied internal and external data breaches and what data is compromised in each set of incidents.
Tech companies and a group of Dallas hackers, offering internships, tools and encouragement, are rallying around a teenager arrested earlier in the week in Texas for bringing a homemade clock to school.
Open-source certificate authority (CA) Let's Encrypt announced the release of its first certificate on Monday.
New York's "Computer Science for All" program aims to make sure that public school children in the city will be well-prepared for computer science jobs.
Security practitioners might not like to admit it, but they've been playing games with adversaries for years. Whether it's whack-a-mole, cat-and-mouse or chutes and ladders, the security game has always been reactive in nature or one that has us alternating between steps forward and steps back.
Intel announced the establishment of the Automotive Security Review Board and the release of a new automotive cybersecurity based white paper.
After nearly half a decade, GM finally got around to patching an exploit that left millions vulnerable to an attack that could seize control of a vehicle.
Business that embrace bring your own device (BYOD) could gain from Apple's improved security features.
Microsoft has completed the acquisition of cloud security provider Adallom, in a deal that is reportedly worth $250 million.
Google Chrome has neutralized the AdBlock Plus application, and similar extensions, forcing some users to view full length video ads on YouTube.
Most network security professionals agree that there's no such thing as a perfect system. But that's not what keeps them up at night.
Research from Rapid7 uncovered vulnerabilities in video baby monitors that could provide a pathway to compromise other devices and networks that link to business resources.
After a stint at CipherCloud, former Forrester vice president and Intel Security exec Chenxi Wang has joined Twistlock to oversee corporate strategy and marketing.
A KPMG Health Care and Cyber Security report found that four-fifths of execs said their data has been compromised in cyber attacks.
The Linux Foundation (LF) gave internet users a peek into its employees' security practices in a Github post this past week that details their various techniques for maintaining secure workstations.
Both Amazon and Google took steps to downplay or completely rid its company's entities of Flash ads.
Agora, one of the largest online black market sites, halted operations after concerns arose of vulnerabilities in Tor's hidden service.
Sign up to our newsletters
SC Magazine Articles
- Chinese govt. complied with U.S. request to arrest hackers
- Obama administration will not push for legislation requiring mandatory encryption
- Data Security in the 21st Century: Understanding what data to protect
- Consumers need to up password security: Darren Guccione of Keeper Security
- U.S. authorities identify Chinese companies that benefited from military cybertheft