China is looking to construct its own secure smartphones capable of evading U.S. surveillance programs.
The deadly ISIS terror attack in Paris and the on-going police activity stemming from that incident may bring to a head the argument over whether or not the benefits encryption brings to privacy is worth the risks run when bad guys use the technology to pull off attacks or run criminal operations.
Further security and privacy risks to users of Siri, Apple's personal assistant, have been revealed that could allow anyone to gain entry to personal data on someone else's iOS device.
At a conference in Washington, D.C. on Tuesday, Microsoft CEO Satya Nadella discussed the security focus behind Windows 10, the company's latest operating system, and laid out the company's security ambitions.
As quickly as researchers discover ways to remove and block Remote Access Trojans used for spying on mobile devices and computers, hackers are creating new spyware strains from previously discovered malware - and they are developing more advanced capabilities from the original malware.
A new study investigating how IT security professionals assess and mitigate cybersecurity risks showed much room for improvement.
Researchers found a bug that could have potentially exposed the personal data of every customer.
With Black Friday and the holiday shopping season fast approaching, the Federal Bureau of Investigation (FBI) is warning consumers to be on the lookout for cyber scams, particularly those offering "too good to be true" deals.
Researchers at Cheetah Mobile Security Lab discovered Amazon has been selling third-party Android tablets pre-loaded with what they call a "dangerous" Trojan known at Cloudsota, likely the work of attackers in China.
Senator Al Franken re-introduced a stalled bill to ban what he calls "stalking apps" on Wednesday. The proposed legislation seeks to protect survivors of domestic and other victims of abuse, from cyberstalkers.
The latest threat to mobile phones is LTE/4G hacking but is the threat, being demonstrated at Black Hat Europe this week, something to be concerned about now?
A prediction by Gartner foresees that 6.4 billion connected things will be globally in use in 2016 and will reach 20.8 billion by the year 2020.
Despite an ever-growing stream of information demonstrating the difficulties enterprise companies face securing mobile applications, consumers maintain trust in the security of their mobile applications, according to a new survey.
Blue Coat Systems will acquire Elastica, a cloud security startup founded in 2012. Blue Coat will pay $280 million for the San Jose, Calif., cloud security company which started up iin 2012.
Google is reportedly exploring having a manufacturer create Android chips based off its own designs.
Greg Day of Palo Alto Networks made the case for learning from the problems of BYOD and applying them to IoT in his presentation to RSA Abu Dhabi today.
There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.
More than 2,000 iOS apps stocked in Apple's legitimate App Store reportedly contained backdoored versions of an ad library, which could have allowed for surveillance without users' knowledge.
All passwords have been reset for users of vBulletin software, following a breach that compromised the personally identifiable information of nearly 480,000 subscribers
XcodeGhost has been spotted in U.S. enterprises along with a new variant that is designed to infect iOS 9 systems.
Signal made its way into the Google Play Store Monday bringing encrypted text and calling to Android users in a single free app already available to iPhone users.
Members of Google's Project Zero held a week-long competition hunting for zero-day exploits on the Samsung Galaxy 6S Edge, and discovered 11 "high-impact security issues."
Google has patched two vulnerabilities in Nexus devices that could enable remote code execution and more.
Banks are warning Apple Pay users against storing other people's fingerprints on their iPhones, with a threat that would void terms & conditions agreements.
Lena Smart, VP / CIO of the New York Power Authority, offers a few tips for freeing yourself from mobile addiction.
Researchers demonstrate attacks against LTE devices to expose vulnerabilities and practical attack points.
When it comes to compromising mobile devices, pornography is once again the number one infection vector.
A Jaguar XFR may have been stolen using hacking techniques increasingly seen on keyless cars.
Yahoo hired Bob Lord as the company's new CISO, according to a blog post by Jay Rossiter, SVP, product and engineering, science and technology at Yahoo.
A new report found that nearly three-quarters of industry professionals believe there is a medium or high likelihood of their organization being hacked as a result of the interconnectivity of Internet of Things.
Sign up to our newsletters
SC Magazine Articles
- RSA: Cyber-security industry is "fundamentally broken", says Amit Yoran
- DOD contractors pay $13 million fine for hiring Russian programmers
- Top Priority: Federal Government must get cybersecurity right
- Cyber and real war come together in the Ukraine
- Version 4.0 of ransomware Cryptowall released, now encrypts file names