Malware embedded on a USB drive was delivered to members of the American Dental Association (ADA).
Marcher Madness continues with a new, stealthier iteration of the Marcher banking malware targeting Android users in Australia.
An Ohio firearms dealer notified the California Attorney General that the company experienced a data breach that compromised its customers' name and state identification information.
The director of CERT UK laid out some of the problems facing UK cyber-space and outlined what cyber-security could do to help fix them.
The EFF is revising its IM scorecard after a pair of researchers spotted vulnerabilities in platforms previously rated safe.
Cybercriminals are strengthening their DDoS attacks with more amplification and new methods to refine their botnets.
Researchers from the University of California, Santa Barbara have uncovered a hacking technique that could allow bad actors to sabotage location-based mobile apps by simulating large number of devices that don't actually exist.
The PLATINUM team has "gone to great lengths" over many years "to develop covert techniques" so their cyber-espionage campaigns will evade detection, even using Windows's support for "hotpatching" against it.
Mozilla released 10 security advisories affecting its Firefox open-source web browser.
Malware discovered at a nuclear power plant in Germany prompted RWE AG to shut down the power plant as a precaution.
Facebook has updated its social login process after a security firm found a bug that could have enabled adversaries to steal victims' online identities.
In order to better improve and ensure cyber-security of government websites, Philippine senator Ralph Recto plans to recruit "bored" Filipino hackers to serve as "cyber-commandos".
Emails sent to businesses demanding payment to avoid a DDoS attack were enough to spur some to pay off, even though no attacks resulted.
A researcher has discovered a way for attackers to sneak remotely hosted, unauthorized applications past Microsoft Windows' whitelisting security feature Applocker, by abusing the command-line utility Regsvr32.
The Massachusetts Institute of Technology (MIT) introduced a bug bounty program last week that it termed "experimental."
A Taiwan-based security researcher, known as "Orange Tsai, who was awarded a $10,000 bug bounty in February, published a report detailing the exploits that led to his discovery of illicit code on a Facebook server.
Cisco issued five security alerts this week, issuing software updates to patch a series of vulnerabilities, any of which could potentially trigger a denial of service condition.
A teenager turned himself in to police in Staffordshire, U.K., where he was arrested on charges stemming from a breach of internet services provider TalkTalk.
Researchers at DB Networks and Osterman Research find many orgs lack the proper tools to monitor their data bases.
A new report from FireEye Threat Intelligence said that one case investigated by Mandiant indicated that a victim computer "was originally compromised with GRABNEW malware by a separate threat actor."
Two updates in TeslaCrypt illustrate that ransomware is not only spreading wider, but is also evolving with new capabilities.
Australian Prime Minister Malcolm Turnbull confirmed that the Australian Bureau of Meteorology was indeed a target of a cyberattack last year.
Researchers have uncovered a vulnerability in the way non-Bluetooth dongle devices interact with wireless mice and keypads, which could enable a nearby hacker to take over a victim's computer using radio frequency signals.
Google researchers partnered with a research team from the University of California, Berkeley to analyze the infection and potential remediation of more than 760,000 websites during an 11-month period.
Web hosting provider Invision Power Services (IPS) was saved from a software compromise that could have potentially damaged its clients after researchers gathered intelligence on a cybercriminal operation taking place on the dark web.
A wave of DDoS attacks were launched against the government-funded education network Janet yesterday morning.
A deeper probe into the JBoss server vulnerabilities linked to recent Samsam ransomware attacks has uncovered 3.2 million unpatched machines that are potentially susceptible to this attack vector.
The iPhone used by Syed Rizwan Farook, one of the shooters in the San Bernardino terror attack that left 14 people dead, was not found to contain any useful information, according to reports.
VMware advised users to patch a critical issue that could allow man-in-the-middle (MitM) attacks or web session hijacking.
SC Magazine Articles
- Was Spotify breached? Account info shows up on Pastebin
- Report: Ransomware feeds off poor endpoint security
- Researcher finds backdoor that accessed Facebook employee passwords
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- FBI investigating attack against computer networks at U.S. law firms
- Pros examine Mossack Fonseca breach: WordPress plugin, Drupal likely suspects
- First Choice Credit Union files class-action suit against Wendy's over breach
- Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts
- Researchers spot Android Infostealer disguised as Chrome update
- Researchers spot mobile malware competition on the black market
- Judge ruled go ahead for claims of phone hacking against UK tabloid