You searched for cyber | SC Media

Your search for cyber returned 28 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Slideshow remove

Your search for cyber returned 28 results

Sort Results:

Relevant Recent
Slideshow

Weekend news review: March 30- April 3

This week President Obama beefed up the United States’ possible cyber attack recourse, and IBM invested $3 billion in a new Internet of Things (IoT) unit. For a closer look at these articles, click here to visit our news section.
Slideshow

Weekend news review: March 9-13

The CIA plans to reorganize with cyber security in mind an a vulnerability was found in Google Apps.For a closer look at these articles, click here to visit our news section.
Slideshow

Weekend news review: January 20-23

President Obama gave his State of the Union speech this week and allotted some time to cyber security endeavors. In response to the Administration’s proposed revisions to CFAA, the security community voiced dissent online.For a closer look at these articles, click here to visit our news section.
Slideshow

The biggest information security arrests

Thanks to a little luck, the inevitable missteps of over-ambitious cyber crooks and the kind of solid investigative work that would make Eliot Ness beam with pride, over the last decade law enforcement agents have arrested some top names in cyber crime, busted up identity theft rings and taken down dark websites. While jails are…
Slideshow

Present and past cyber threats

Although threats are a constant in the security world, new ones continue to pop up as attackers design new tactics. This list mentions some of the major threats the security community has seen.
Slideshow

September 2014 Threat Stats

More than 800 million personal records have been involved in U.S. breaches since January 2005, according to new research from the Privacy Rights Clearinghouse. Also this month, IT security professionals are starting to have a higher perception of risk to corporate, industrial and governmental infrastructure because of cyber security threats.
Slideshow

Weekend news review: July 7-11

Erasing an Android’s memory might make its contents appear to be erased, but in actuality, a savvy hacker could easily recover sensitive data, according to AVAST researchers. Also this week, a bill passed the Senate allowing for the private and government sector to actively communicate cyber security threats between each another. For a deeper look…
Slideshow

June 2014 Global Threats

Our global threat map yet again highlights cyber attacks that have taken place throughout the world. In one case, a hacker accessed an Ohio child’s baby monitor, which was then used to scream profanities.
Slideshow

January 2014 global threats

January’s global threat map shows where some of the major cyber incidents have taken place around the globe. During the past month, Russia was the top producing country of zombie IP addresses.
Slideshow

Top 5 legal developments in 2013

From the introduction of “Aaron’s Law” to laws being passed to curb the threat of cyber espionage, these are the notable legal developments that caught our attention this year.