GSM-based credit card skimmers capable of sending credit card data via text messages were at three New York gas stations.
Malwarebytes researchers have developed decryptors for unlocking all legitimate older versions of Petya ransomware.
With warnings about stress testing response mechanisms, the Prudential Regulation Authority is putting the insurance industry on notice as to what it expects from the cyber risk market.
Android 7.1 Nougat contains a secret panic mode designed to be triggered in the event that malware locks a user's screen.
A new report from EfficientIP reveals a lack of awareness as to the variety of DNS attacks, a failure to adapt security solutions to protect DNS and poor responses to vulnerability notifications among businesses worldwide.
Both Edward Snowden and the Shadowbrokers have used the NotPetya attacks, to provide their unique perspective on the situation.
Researchers last week spotted a new variant of the Koler ransomware targeting U.S. users with fake Pornhub apps in its latest campaign.
After recently wreaking havoc on a Japanese Honda plant, WannaCry made its way across the ocean to Australian traffic cameras.
SC spoke to Adam Meyers, VP of intelligence at Crowdstrike at this year's InfoSec Europe 2017 about attribution and why it could be useful even for smaller businesses.
Hackers launched an attack against Union Bank of India that was very similar to the attack Bangladesh bank heist that resulted in the theft of $81 million.
The probe of a U.S.-based Turkish hacker shed light on an Austrian intelligence agency dispute and found that the Bowling Green attacks may have been real after all, just cyber
"Cybersecurity is a service and the service is enterprise is risk management," City of San Diego Chief Information Security Officer, Deputy Director Gary Hayslip
A Pittsburgh child admitted to launching cyberattacks on the Brussels airport just hours after last year's ISIS attacks.
The Pennsylvania Superior Court has ruled the University of Pittsburgh Medical Center isn't responsible for protecting employee data.
The Leet Botnet may have wrested the 2016 crown as most powerful distributed denial of service (DDoS) attack from Mirai with a 650 Gigabit per second (Gbps) attack launched early last week.
Japanese Defense Ministry and Self-Defense Force (SDF) was targeted in September by a sophisticated cyberattack, according to sources cited by The Japan Times.
Retailers and shoppers hardly need to see Santa's Naughty or Nice list to know where most cybercriminals will land this year, although probably not all.
Kaspersky Lab has confirmed that numerous Russian banks have been suffering a wave of DDoS attacks.
An 18-year-old from Sussex has triumphed at the Cyber Security Challenge UK 2016, making him the youngest ever winner of the competition.
A fundamental fault in the SSL handshake could allow hackers to use subvert MacOS and iOS devices and recruit them into a DDoS attack.
A self-described patriotic American vigilante hacker named Jester reportedly took over the Russian Ministry of Foreign Affairs website on Friday in retaliation for alleged Russian cyberattacks on the United States.
Trend Micro researchers found that cybercriminals are using video game currency to launder real world money.
Trend Micro researchers have spotted several exploit kits delivering Cerber 4.0 ransomware just a month after the release of version 3.
A report by the Australian Cyber-Security Centre says that the misuse and over-hyping of cyber-security terms has hampered the public's ability to understand cyber-security issues.
The Obama administration will deliver what is being described as a "proportional" response against Russia in retaliation for that country launching a series of cyberattacks against U.S. political targets.
Phishing remains one of the top threats seen by organisations today. Threat actors use various social engineering tricks to convince users that their requests for information or money transfers are legitimate.
As the number of data breaches increases a recent study found that execs and board members should be more involved in data breach planning.