A North Korean cryptominer is raising questions as to whether it is a tool or a prototype to carry out silent attacks on unsuspecting CPUs.
Many cybersecurity curricula fall short of what budding cybersecurity professionals - and the industry - need. These programs stand out because, in short, they "get it" so they "give it."
2017 saw the rise of economic initiatives intending to boost and benefit from cybersecurity.
Following a pair of data breaches that potentially exposed highly sensitive student and employee information, the chief digital officer at Stanford University's Graduate School of Business has reportedly stepped down.
Pro-ISIS hackers illegally accessed a web hosting provider and defaced the websites of roughly 800 U.S. schools on Monday, according to various news reports.
Engility Holdings and the Center for Cyber Safety and Education are offering a scholarship program to help returning veterans gain cybersecurity certifications to reenter the workforce.
A University of Kansas student was expelled from the school after allegedly changing his grades from an F to and A using information he obtained via a keystroke logger.
The campus, which broke ground in 2015, is the result of Cornell Tech's win of the Applied Sciences Competition under the administration of former New York City Mayor Mike Bloomberg.
Prospective Newcastle University students are being scammed into handing over details and making payments for fake courses.
The program, an effort to build New York's tech ecosystem by delivering a wider pool of skilled workers to tech companies, is funded by a $3.9 million grant under the Obama administration's $150 million TechHire Initiative.
Companies should take notice of what motivates millennials to take advantage of the next generation of cyber talent to fill the employment gap.
A Stanford University website was reportedly compromised for four months without detection, allowing hackers to abuse it to host malicious web shells, phishing kits and defacement images.
A phishing scam in December 2016 resulted in a data breach at the University of Alaska, affecting around 25,000 students, staff and faculty members, according to a report on Wednesday by local Anchorage NBC affiliate KTUU.
All currently cleared U.S. federal contractors will have to have completed an insider threat training course as of June 1 in order to maintain their security clearance.
The Turla advanced persistent threat group appears to have recently created both a new multiplatform backdoor malware program called Kazuar, and a MacOS version of its Uroburos espionage rootkit.
A zero-day bug in Microsoft Office and WordPad that hackers exploited to spy on targeted users, implant malware, and steal banking credentials took nine months to fix, according to news reports.
The data of 1.3 million K-12 students was compromised after being exposed on the student warehouse platform Schoolzilla.
One might think that a net increase of 13,000 information technology jobs in February is a sign of healthy growth in the field, but a comparison to previous employment numbers from the Bureau of Labor Statistics (BLS) paints a more complex picture.
Large teaching hospitals, or hospitals affiliated with medical schools, are more prone to data breaches according to a recent report.
Researchers found 13,930,176 email addresses and passwords on the dark web stemming from major universities across the country.
A lack of gender diversity in tech skills, among other industries, is harming firms and could hurt them even more economically if these trends continue.
Daytona State College was hit with two data breaches this month that affected both employee and student data.
Nearly half (43 percent) of girls in the UK would consider a career in STEM (science, technology, engineering and maths), compared to 54 percent in Ireland and 50 percent in Russia.
A scheme aimed at teaching young people online safety has published a list to show parents that their kids might have an interest IT security.
Cyber-security blogger Brian Krebs spoke at Microsoft BlueHat IL on the psychology of the modern-day supervillain hacker and outlining key threats.