Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That's the way we used to do it back in the '80s and '90s, but does this approach still work?
A Cyphort Labs report provides an in-depth analysis of Backoff, BlackPOS and FrameworkPOS, malware used in some of the biggest breaches.
Technological innovation is now increasingly consumer led forcing organizations to adopt faster to serve them or it diffuses into the work environment leaving the traditional IT to play catch-up.
The coordinated effort includes a newly formed cyber cell comprised of officials from the NSA, FBI and Britain's GCHQ and MI5.
DARPA has started accepting applications to develop a stronger defense against DDoS attacks.
A California judge ordered Ellen Pao to pay Kleiner Perkins $275,996.93 for its successful gender discrimination case win against the former employee.
Senate Republicans and Democrats traded barbs over Defense Authorization Act vote.
A single solution won't stop data theft, says ADP's Roland Cloutier.
During a speech at Stanford University this past week, U.S. Defense Secretary Ash Carter acknowledged the government's desire to hire young talent for cybersecurity work.
A Russian hacker illegally manipulated over a dozen penny stocks generating more than $77,000 AUD in false profits, according to the Australian Securities & Investment Commission (ASIC).
This is another market area that has seen a lot of change over the past few years.
The DHS will gain more control - and federal cybersecurity likely will be improved - when a FISMA update is passed, reports Lee Sustar.
A group identifying itself as CyberBerkut claimed, in an email to SC Magazine, to have gained access to files on the mobile device of a Green Group official.
A report by Ari Kaplan Advisors and sponsored by Nuix found most infosec pros collaborate with data managers.
A hearing on default device encryption took place this week while more Wordpress vulnerabilities were discovered. For a closer look at these articles, click here to visit our news section.
This week, the Federal Trade Commission (FTC) expounded on previous comments surrounding the inherent risk in the Internet of Things (IoT) by releasing a detailed report. Also this week, ransomware was documented, for the first time, as dropping trojans and malware on infected users' systems. For a closer look at...
The head of the U.S. Cyber Command believes his organization's capabilities need to be better integrated into all aspects of the country's cybersecurity effort and should be an integral part of all upcoming military plans.
Three days after Yahoo announced its new "on-demand" passwords (ODP), the company's CISO Alex Stamos took to Twitter to defend the company's decision and address criticism from the security community.
Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.
British law enforcement arrested 56 people, including a man accused of hacking the U.S. Department of Defense, this past week in operations targeting alleged cybercrime perpetrators.
Sign up to our newsletters
SC Magazine Articles
- Anonymous hacks, 'Rickrolls' ISIS
- IBM, Oracle, Cisco certification manager breached, info accessed
- Hilton Worldwide confirms malware on POS targeted payment card info
- Algebraic Eraser, the algorithm running the 'Internet of Things' is broken...again
- Sony hackers remained hidden for months due to a new toolset: Damballa