By the time the National Security Agency (NSA) nixed its email surveillance program in December 2011, other surveillance initiatives that could "satisfy certain foreign intelligence requirements" had taken its place, according to a report in The New York Times.
Network defense of the nation's critical infrastructure is sorely lacking, according to a report by the Government Accountability Office.
While external threats present an ever-present risk for large and small enterprises, a new report said the actions of a company's own employees, suppliers and partners pose more of an immediate danger.
Understanding user behavior analytics could help enterprises detect cyberattacks earlier, according to researchers at Rapid7.
A new study investigating how IT security professionals assess and mitigate cybersecurity risks showed much room for improvement.
Researchers at Tencent's Xuanwu Lab demonstrated attacks using barcodes that could deliver commands to systems that read them.
Researchers have spotted the POS malware dubbed "Cherry Picker" targeting the food and beverage industry.
After reporting last week that it had issued banned certificates that could facilitate man in the middle (MitM) attacks, Comodo has fixed the "subtle bug" that the company's Senior Research and Development Scientist Rob Stradling wrote prompted the problem.
Even as it adds more electronics to its vehicles, Ford will make personal data protection a priority, promising not to use customer data without the express consent of the car owner, a Ford executive said Wednesday, speaking at Web Summit in Dublin.
A just-released report surveying endpoint security across the federal government highlighted some dire lapses.
Michael Cosiscia was convicted for disrupting commodity futures prices in a $1.4 million fraud scheme marking the first federal prosecution of its kind.
XcodeGhost has been spotted in U.S. enterprises along with a new variant that is designed to infect iOS 9 systems.
The Ranking Digital Rights group released its inaugural "Corporate Accountability Index," which ranks 16 of "the world's largest internet and telecommunications companies,".
Mozilla included a Tracking Protection feature in the new Firefox Version 42.0 for Windows, Mac, Linux and Android that will give users more control over the information they share with third parties.
Kaspersky Lab has declared CoinVault and Bitcryptor dead following the both the arrest of its alleged authors and release of a final set of decryption keys.
Chief security officers are trying to implement better IT security in the face of increasing breaches - and often doing it on a tight budget, reports Karen Epper Hoffman.
There's nothing like a breach - or two - to galvanize the federal government to contain risk and strengthen its cybersecurity posture. DHS's Gregory Touhill says his agency is on the case. Ashley Carman reports.
The one-throat-to-choke theory is a fallacy, says David Shearer, CEO, (ISC)².
Massachusetts Institute of Technology (MIT) researchers published a paper earlier this week that demonstrated how specific radio signals can be used to track human beings through walls.
Following a debacle over misissued certificates, Google published a warning blog post to Symantec, essentially telling the company to step up its game or face further action from the tech giant.
Fitbit says their devices are safe and is denying claims that its fitness trackers can be used to distribute malware.
A panel of cybersecurity professionals discussed alternative ways that companies can practice social engineering.
The rate at which new data breaches are announced in the headlines should alarm every company with sensitive data to protect. From OPM to Ashley Madison to Machine Zone video games, data breaches are going undetected by existing security technologies and processes.
Uber accidentally exposed the personal information of more than 600 drivers during the Tuesday release of its "Uber Partner app"
An uptick in government surveillance requests in Mexico has privacy advocates troubled that the country does not have the supervision in place that it needs to keep sensitive information from falling to those who don't have a right to ask for it.
Dell announced its acquisition of EMC on Monday in a deal valued at approximately $67 billion.
Verizon will start sharing user data, including the use of a controversial code tracker, with the AOL Advertising Network.
The Ponemon Institute and Hewlett Packard Enterprise released their annual cost of cybercrime study, the result sof which indicted that companies spent more this year to combat digital threats.
Five Russian banks that experienced distributed denial of service (DDoS) attacks Sept. 26 had been warned in advance by the General Directorate of Security and Information Protection of the country's Central Bank.
Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.
Sign up to our newsletters
SC Magazine Articles
- Supreme Court hears first appeals case for exec convicted under CFAA
- Black SEO offered to cyber-criminals
- FBI investigates Russian hacker that stole billions of login credentials
- 5M affected in VTech breach; security concerns raised with popular holiday items
- Internet of malicious things: Yale home automation vulnerable