The third and final presidential debate was heavy on the kinetic and light on the cyber. And it shouldn't have surprised anybody.
Security researchers said Tuesday they have come across a new strain of espionage malware that has successfully infected 800 different organizations this year in the Middle East to steal information and spy on communications.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
Protesters in Syria wanting to overthrow the Assad regime are being targeted in government-backed espionage efforts.
The complex Flame espionage toolkit shows efforts to gather intelligence on certain countries is in high gear, but the malware's functionality may not be all that different from what already is on the scene.
The Cyber Intelligence Sharing and Protection Act of 2011 would give the federal government authority to share classified cyber threat information with the private sector.
There remain more questions than answers after defense contractor Lockheed Martin over the weekend disclosed that its systems had been successfully breached.
The FBI must bolster its information sharing and cybersecurity expertise to effectively investigate and combat the most serious cyber intrusions, according to a new audit.
Reactions are running rampant after Comodo revealed it was tricked into issuing rogue digital certificates.
An advisory warned of nine fraudulent digital certificates issued by Comodo that could have been used to impersonate some of the world's highest-profile websites.
Though some have labeled the website attacks surrounding the WikiLeaks controversy to be the first-ever global cyberwar, security experts say the truth is much less sensational.
Could a cargo ship's thwarted piracy reveal more than bullet holes and bloodstains? A theoretical view of why compromised shipping cargo information could make pirates and hijackers rich.
A political hacker has claimed responsibility for a distributed denial-of-service (DDoS) that took down Wikileaks.org just before a planned release of confidential documents.
Just as cybercriminals share information, the private, private and international communities must ally to combat today's threats.
2011 promises to deliver a major influx of mobile application attacks, plus other sophisticated digital assaults, said Dave DeWalt, CEO of McAfee, during a keynote address Wednesday at SC Congress Canada in Toronto.
Security veteran Howard Schmidt and Lt. Gen. Robert Elder are set to speak at next month's SC World Congress, it was announced Friday.
Computer security professionals can learn from the Stuxnet outbreak.
Many in the security community say Google would be wrong to base its decision to scale back internal Windows use over security concerns.
Google is planning to migrate its end-users away from the use of Windows in the wake of Chinese-led targeted attacks that raided its corporate infrastructure of intellectual property, a Monday report in the Financial Times said.
All IP-enabled devices are at risk to devastating attacks that can result in the theft of intellectual property, or worse.
PDF exploits, broadband penetration and targeted attacks helped drive the cybercriminal community in 2009, Symantec's annual "Global Internet Security Threat Report" found.
Yet another complex -- but stealthy and effective -- cyberespionage network has turned up, this one largely targeting Indian computer systems. Again, the operation is believed to be run out of China.
Computers from around the world are being targeted in a new malware campaign designed to silence Vietnamese political activists, according to Google and McAfee.
A new U.S. Senate bill would threaten countries with funding restrictions if they fail to properly address cybercrime within their boundaries.
Cyberwarfare is set to grow with devastating consequence, capitalizing on the historical separation between government and industry and the lack of shared visibility within and across these two sectors.
The status quo is not working to defend the nation's networks from sophisticated cyberespionage and warfare. Instead smarter, user-friendly solutions and more awareness is needed, while keeping an eye on civil liberties, a panel of former government officials and privacy experts said Wednesday at the RSA Conference.
Intel told the federal government that it was the victim of a "sophisticated" cyberattack that occurred in January, around the time cybercriminals compromised systems at Google, Adobe and more than 30 other large companies.
A new report authored by retired Gen. Eugene Habiger of the U.S. Air Force finds that that the public and private sector must deploy secure systems that are properly tested and certified to withstand sophisticated cyberattacks.
The risk of cyberattacks on critical infrastructure systems is rising and respondents to a new McAfee survey suspect a major incident is coming -- one that may cost millions and result in loss of life.
A "critical" Internet Explorer vulnerability, used as part of a mix of malware designed to steal sensitive intellectual property from major U.S. companies, was fixed on Thursday.
Sign up to our newsletters
SC Magazine Articles
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- Women in IT Security: 10 Power Players
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Report: Phishing costs average organization $3.7 million per year
- Women in IT Security: Women of influence