IT security professionals report that they are regularly pressured to roll out new technologies and devices regardless of whether they are secure, according to a new survey.
The non-profit Internet Archive library today unveiled a virtual Malware Museum, which offers a look back at some of the hacking community's earliest attempts to infect computers.
Apple has brought on board two security researchers who previously worked to develop the infamous Thunderstrike 2 worm.
Bank of America, Wells Fargo and JPMorgan Chase have announced plans to roll out ATMs that take smartphones as well as ATM cards.
A report today from Harvard University's Berkman Center for Internet and Society predicts that in lieu of backdoors to encrypted messaging apps, intelligence agencies will increasingly turn to less fortified vectors to conduct digital surveillance.
A combination of machines and humans is key to risk management, Carole Fennelly says.
Security awareness training aims not only to impart information, but also to change behavior.
FireEye researchers have released a report which details potential security issues with software used to dynamically patch iOS apps.
Two new reports from recruitment company BeecherMadden have shown demand for cyber-skills to be rising massively with few able to meet that demand while CISO salaries are also going up.
With Data Privacy Day now upon us, cybersecurity experts from across the industry have offered their advice on how both individuals and organizations can protect their data.
SCMagazine.com asked key thought leaders to identify key events in last year that have reshaped public policy and expectations of what happens—and what should happen—to personally identifiable information when users go online.
DDoS attacks are on the increase and getting bigger and more widespread, according to research released by Arbor Networks.
The majority of consumers surveyed by YouGov are skeptical that organizations securely handle the data they share online.
Cybersecurity startups hold a premium position within Israel's investment ecosystem and are second only to the U.S., according to researchers at YL Ventures.
Respondents to a new survey from FICO unanimously agreed: Data breaches this year in other industries will damage financial institutions.
Security firm goes full disclosure on mechanics of SSH issue and finds three more vulnerabilities
64 percent of more than 1,100 IT security executives believe that simply meeting cybersecurity compliance requirements, as opposed to striving for best practices, is "very" or "extremely" effective at preventing data breaches.
Sixty-one percent of CEOs are concerned that cyberthreats could have negative impact on their corporate growth prospects, according to PricewaterhouseCoopers' (PwC) 19th Annual Global CEO Survey report.
Fortinet released a statement concerning a recently disclosed vulnerability that was referred to as a backdoor by some.
A number of remote code execution bugs in several models of FRITZ!Box broadband routers could allow intruders to place phone calls through the device.
Researchers at IBM X-Force have spotted an aggressive infection campaign targeting major Japanese banks.
The Raspberry Pi Foundation was offered money to pre-install malware on its inexpensive computers by someone claiming to be a "business officer."
Encryption will impact everyone from security personnel to consumers in the post-quantum computing world, reports Doug Olenick.
Digital rights activist Shari Steele took the reins Friday at the Tor Project as executive director.
Shaun Bridges, the former Secret Service agent who pleaded guilty to stealing $820,000 worth of Bitcoin during the Silk Road investigation, was sentenced in federal court to 71 months in prison.
Adobe patched 78 bugs in the last Patch Tuesday of 2015 including five Priority 1 vulnerabilities.
When visiting a medical facility, it can be tempting to charge a mobile device into a spare USB port, but the free charge may contain an unpleasant after-effect.
By the time the National Security Agency (NSA) nixed its email surveillance program in December 2011, other surveillance initiatives that could "satisfy certain foreign intelligence requirements" had taken its place, according to a report in The New York Times.
Network defense of the nation's critical infrastructure is sorely lacking, according to a report by the Government Accountability Office.
While external threats present an ever-present risk for large and small enterprises, a new report said the actions of a company's own employees, suppliers and partners pose more of an immediate danger.
Sign up to our newsletters
SC Magazine Articles
- Skype targeted by T9000 backdoor trojan
- CISO salaries and demand for cyber-skills skyrockets, surprising no-one
- Student SSNs exposed in University of Central Florida breach
- Malwarebytes says sorry for multiple AV bugs, still unpatched
- Ransomware and POS attackers to zero in on small businesses, retailers
- Hearthstone gamers who download cheats may be cursed with malware
- Cryptowall has been a cash bonanza for criminals, failure for cops
- IRS hackers try to use stolen SSNs to generate E-file PINs
- Report: Pros urged to roll out IT projects before they are security-ready
- Security issues plague web dating software