Akamai's Q1 State of the Internet Report shows an increase in frequent, longer lasting low bandwidth attacks.
While most people acknowledge the security risks of opening an email from an unknown sender or downloading an app from an unauthorized app store, many continue to engage in this risky behavior.
Claims that researcher Chris Roberts actually, briefly, commandeered a plane in flight after hacking its entertainment systems may be up for debate; contentions that the aircraft may be vulnerable are not.
Distil Networks has produced their annual Bad Bot Report. It's the IT Security Industry's most in-depth analysis on the sources, types, and sophistication levels of last year's bot attacks-- and there are serious implications for anyone responsible for securing their web infrastructure.
For its 18th year in Las Vegas, Black Hat received its largest pool of submission yet from security pros.
Mason Pachulski, the son of Keith Pachulski, was last seen this morning outside his family's home in Jim Thorpe, Penn.
During a speech at Stanford University this past week, U.S. Defense Secretary Ash Carter acknowledged the government's desire to hire young talent for cybersecurity work.
Nearly 94 percent of respondents believed that NSA's surveillance had increased or remained the same since Snowden began leaking classified information in June 2013.
The counterterrorism, security and aviation communities must contemplate how unintended use of aircraft systems or networks could have a downstream impact.
'Is cyber-security in enough of a crisis to need a paradigm shift?' asks Dan Geer, CISO of In-Q-Tel, at RSA.
Technology can't replace the value of online safety education, the key to keeping kids out of predators' paths, panelists shared.
An SEC commissioner's chief of staff and shareholder advocacy expert discussed complex disclosure expectations among investors.
More than a dozen cybersecurity organizations met earlier this week to discuss plans to establish a framework for resolving the "shortfall of qualified people in the cybersecurity profession."
Manny Rivelo was named president and CEO of F5 Networks, an application solutions provider, this week.
The death of email, widely anticipated 10 years ago, has not come to pass, thanks to email authentication schemes such as SPF, DKIM and most recently DMARC.
Panelists discussed cyber espionage and intellectual property theft affecting U.S. companies and steps the private and public sector must take to curb the threat.
Sharing of industry and government data, collated centrally to create a cyber-threat weather map is now underway in the U.S., with threat indicators being issued.
At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.
The threat landscape has changed and we have to constantly challenge the existing thinking to get ahead of our adversaries RSA President Amit Yoran told delegates on Tuesday.
As companies increasingly integrate Open Source Software (OSS) into their business IT environments, they appear to be faltering in monitoring the software for vulnerabilities and creating official policies and procedures.
Raytheon Company will acquire Websense later this year in a $1.9 billion deal with Vista Equity Partners.
IBM launched a cyber threat intelligence sharing platform on Thursday that the company is billing as a social media network for security analysts.
CloudLock released its "Cloud Cybersecurity Report: The Extended Perimeter" earlier this week that looked at enterprises' use of cloud applications and storage.
After splitting from AccessData in 2014, the security start-up has decided to restructure to focus on customers and product development.
Symantec's annual threat report doesn't exactly depict a rosy cyber security world.
Verizon says it has a new-and-improved model for determining breach costs.
After continuously trying to regain access to a specific target's systems, Hurricane Panda willfully stepped away once it saw that the company was monitoring Indicators of Attack (IOA).
Symantec confirmed its plans to separate itself from its Veritas data-storage and recovery business by the end of 2015 on Monday.
You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.
The responses of global practitioners were compared with Global 1000 security execs, which provided a best practices benchmark.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes