WikiLeaks penned a letter to Google CEO Eric Schmidt requesting more information about search warrants under which the company handed over WikiLeaks staffers' data.
The app is no longer available from the Google Play store, but prior to being removed it had been installed between 50,000 and 100,000 times.
The security community is voicing concern over proposed revisions to the Computer Fraud and Abuse Act (CFAA) by taking to Twitter and personal blogs.
As part of a recent spam campaign, Trend Micro researchers observed a variant of CTB-Locker ransomware asking for 3 Bitcoins within 96 hours.
Two stand-alone modules, dubbed Hopscotch and Legspin, were analyzed by Kaspersky Lab.
The National Association of Federal Credit Unions sent Congressional leaders a letter calling for the creation of a bipartisan working group to shape breach legislation.
Google gave out thousands of dollars in rewards to several external researchers who dug up and reported bugs, several of which were deemed high impact.
In April 2014, Brown pleaded guilty to posting an online threat aimed at a federal agent, as well as other charges.
Adobe said it is aware of reports that an exploit for the bug exists.
In its "Security on the Shelf" report, Osterman Research found that for every $115 a company spends per user on security-related software, $33 of the investment is "not working as well as it can" or is never used at all.
The President urged Congress to pass law that would better protect the nation from emerging cyber threats.
The company's January quarterly release addressed vulnerabilities across hundreds of products and patched bugs that could have been remotely exploitable without authentication.
A New Jersey congressman has asked the Justice Department to investigate whether New Jersey Governor Chris Christie and a Port Authority official violated state privacy laws when they revealed E-ZPass data.
The "Cisco 2015 Annual Security Report" explores what's trending with regard to attackers, users, and defenders.
The New York Times revealed new info on NSA's years-long surveillance efforts against North Korea.
A panel held during the annual NRF conference discussed ways that retailers could bolster security.
US-CERT issued an advisory on Thursday, warning of phishing emails referencing the Affordable Care Act.
The attorney general is pushing lawmakers to back legislation that would expand the definition of protected "private information."
Mobile security company Lookout released its annual Mobile Threat Report on Thursday, which demonstrated a major uptick in Android malware encounters.
Numerous Firefox vulnerabilities, some deemed critical, have been addressed by Mozilla in the latest release of its web browser.
The Aberdeen Group teamed up with Wombat Security Technologies to create a Monte Carlo model that would quantify how employees' online actions correlate with an enterprise's risk
A Florida senator is drafting the Data Security and Breach Notification Act of 2015, a year after similar legislation was introduced.
The highly anticipated SC Awards U.S. are just around the corner. Here's the full list of finalists competing to take home a trophy on the big night in San Francisco.
Round one of the 2015 SC Awards U.S. finalists includes categories for best email security solution, UTM security solution, emerging technology, security team and CSO of the year.
According to a survey of more than 2,000 executive and IT professionals, less than half feel very prepared to recover their IT and related assets following a disaster or other incident.
Round one of the 2015 SC Awards U.S. finalists includes categories for best database security solution, managed security service, SIEM solution, security company and security company of the year.
Round one of the 2015 SC Awards U.S. finalists includes categories for best DLP solution, risk/policy management solution, customer service, professional certification program and IT security-related training program.
Round one of the 2015 SC Awards U.S. finalists includes categories for best computer forensic solution, best identity management solution, NAC solution, web content management solution, and the excellence award for best regulatory compliance solution.
Round one of the 2015 SC Awards U.S. finalists includes categories for best cloud computing security solution, fraud prevention solution, multifactor solution, application firewall, and the excellence awards for best enterprise security solution.
Round one of the 2015 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.
Researchers at Dell SecureWorks CTU discovered two variants on the malware, which targets Windows 64-bit systems.
Microsoft's bulletins this month addressed multiple issues that had already been disclosed online, including one from Google's "Project Zero" team.
The security of data in the cloud, loss of control over IT services, and compromised accounts are some of the challenges holding back cloud adoption.
Steve Gold, one of the U.K.'s most respected information security journalists, who helped found SC Magazine and was renowned for helping his family, friends and colleagues, has died.
The hackers appear to be supporters of the Islamic State, and reportedly began tweeting out from the @CENTCOM Twitter account around 12:30 p.m.
Speaking to the Federal Trade Commission (FTC), President Obama said he will propose a Personal Data Notification and Protection Act and a Student Data Privacy Act.
FireEye found that a majority of enterprises had their systems breached during the first half of 2014, and often times, advanced malware allowed for the intrusion.
A FOIA lawsuit by The New York Times stirred the Justice Department to make new information available.
A group calling itself CyberCaliphate has claimed credit for the hack, which included militant messages and links to local and state government documents.
The FBI director said that attackers failed to use proxy servers to conceal their whereabouts when sending threatening emails to Sony employees.
There are still options to receive advanced information, but Microsoft will no longer be issuing a public blog post to preview what is to come on Patch Tuesday.
FTC chairwoman Edith Ramirez talked at the Consumer Electronic Show about the Internet of Things and the inherent privacy and security risks that come with the technology development.
Altogether eight vulnerabilities are addressed, two of which can lead to a denial-of-service attack and are deemed moderate in severity.
On Thursday, Netskope released a report analyzing risky app usage in enterprise environments.
The newly discovered 'XOR.DDoS trojan infects Linux systems to possibly build an army of devices to be used in distributed denial-of-service (DDoS) attacks.
German-language speakers are the primary target of a spam campaign that involves a variant of the Emotet banking malware.
Two senators wrote a letter requesting more information about stingray use and the FBI's policies surrounding the devices.
On a recent flight, a Google engineer discovered that SSL certificates were being signed by Gogo, not Google.
Malware is being distributed to visitors of The Huffington Post website, as well as several other sites, via malicious advertisements served over the AOL advertising network
Timothy DeFoggi, the former acting director of cybersecurity for Health and Human Services, was convicted in August 2014.
The USPS announced in November 2014 that it was looking at a possible cyber intrusion into some of its information systems, and this latest finding was discovered during the investigation.
Google's "Project Zero" team discovered an elevation of privilege flaw in Windows 8.1 and detailed the vulnerability online, 90 days after alerting Microsoft.
Morgan Stanley discovered account names, numbers and transaction data for more than 900 clients posted on the internet, according to reports.
President Obama has issued a formal U.S. response to the Sony hack in the form of sanctions against North Korea.
Although a recent study found that nearly 80 percent of anonymous network Tor's traffic was to child abuse sites, one of the network's original designers and various experts have said the staggering stat cannot be taken at face value.
This year saw 56 percent of all website traffic coming from bots, with 29 percent of those bots being considered 'bad,' and 27 percent being 'good.'
Early reports suggest that the news organization being threatened is CNN.
The National Credit Union Association Inspector General will investigate how a thumb drive containing PII went missing and why it took so long for the breach to be reported.
A federal judge in New Jersey has approved of law enforcement's use of a fake Instagram account to collect evidence on a man suspected of stealing millions of dollars worth of jewelry.
Norse Corporation reportedly had discussions with the FBI, but officials are still saying that North Korea is responsible for the attack on Sony.
The ISC website was quickly taken down after researchers with Cyphort Labs identified that the main page was ultimately redirecting visitors to the Angler Exploit Kit.
More than 75 percent of organizations in the U.S. and U.K. have experienced at least one DNS attack.
The trojan was detected by Kaspersky Lab researchers as Chthonic, and it appears to be an evolution of ZeusVM.
Vulnerabilities in Signaling System 7 make it possible for anyone to listen in on phone calls and read text messages, even if encrypted.
Neverquest, also known as Vawtrak, is data stealing malware that targets banking information.
Phishing emails, a phishing kit and phony browser alerts are being used by the attacker to steal credentials and deliver a variant of the Zeus trojan.
Two major telecommunications companies are under fire from the FTC and FCC for their "cramming" practices.
Sony Pictures recently canceled the "The Interview" movie release, following hacker threats.
Researchers at Trustwave SpiderLabs have released details on a new Alina variant dubbed Spark.
The First Amendment Coalition is suing the San Diego Police Department and the city of San Diego in an effort to get public records released on the force's stingray use.
The vulnerability can enable attackers to steal credentials and personal and business data, as well as infect machines with malware.
Four former Sony workers have filed two class-action suits claiming the company failed to plug security holes and protect their personal data.
An employee with PhishMe was targeted by a crafty phishing email, allowing researchers to analyze an innovative attack that results in a malware infection.
Anchorage Community Mental Health Services (ACMHS) must pay $150,000 and integrate an action plan to meet HIPAA compliance.
Back in October, the Chinese iOS trojan was discovered by Lacoon Mobile Security.
OphionLocker doesn't diverge much from previous ransomware schemes, although it does generate a unique hardware ID based on the first hard drive's serial number, the motherboard's serial number and other information.
Microsoft's early December appeal of the government's efforts to get customer email stored on a server in Ireland has garnered support of rivals and privacy groups.
Alert Logic discovered the bug, which is susceptible to exploitation due to the default installation process used by Linux.
A report from DellSecureWorks Counter Threat Unit revealed hacker training tutorials, replacement guarantees and a drop in RAT prices.
Sony Pictures's attorney David Boies is demanding that news outlets destroy "stolen information" involved in the leaks.
WordPress websites are being infected with malware through a previously disclosed vulnerability in the Slider Revolution plugin.
Kaspersky Lab summed up its year's findings and saw that U.S. users were the main targets of Mac OS X malware.
The Senate passed the Act on Wednesday after adding a controversial amendment and the House rushed to pass it with little room for debate.
Eric Omuro, who also goes by "Red," ran the site myRedBook.com.
Social media represents the next frontier of threats; 2015 will be the year for social media managers and IT security professionals to unite, one study says.
Citing progress, a state audit report details the vulnerabilities that the University of Maryland College Park (UMCP) needs to fix.
Symantec tracked the price of stolen goods and malicious services, as well as black market price fluctuations over the years.
In a class-action suit filed in federal court, a father-daughter duo accuses Comcast of using their routers to create public Wi-Fi hotspots, increasing their electricity costs and leaving them vulnerable to security issues.
Blue Coat Systems broke down its findings on the mysterious perpetrators behind 'Inception,' but in reality, nothing can really be concluded about their location or overarching goals.
Encrypted communications between a Samsung smartwatch and Android device were easily cracked by Bitdefender researchers.
A survey of IT security pros commissioned by Malwarebytes revealed that ransomware topped the list of security threats.
A security expert estimates that around 10,000 legitimate websites were impacted by the campaign.
Three bulletins were determined to be 'critical' and four were rated 'important.'
A vulnerability in Adobe's Flash Player was not included in its pre-notification security advisory Friday, and is currently being targeted by attackers.
The 2012 breach, which occurred when two unencrypted backup tapes went missing, affected 260,000 people nationwide.
Peter Smith, the husband and lawyer of plaintiff Anna Smith, argued that her Fourth Amendment rights were violated in dragnet surveillance by the NSA.
Meanwhile, an internal email between execs at Sony Pictures and Mandiant, the forensics unit tapped to investigate the breach, leaked to the press.
The reality of ubiquitous reliance on ICT has given rise to the criticality of cyber security, says Cisco CSO Edna Conway.
Information exposed in the breach reportedly ranges from thousands of Social Security numbers to sensitive HR and proprietary data.
Most businesses store and process financial data, yet 63 percent do not have a mature way to control and track sensitive data, Trustwave found.
Sign up to our newsletters
SC Magazine Articles
- WikiLeaks requests information on staffers search warrant data requests
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Albany health system notifies more than 5,000 patients of data breach
- Could the Sony breach have been prevented?
- Proposed CFAA revisions agitate IT security community