The 2017 DEFCON conference will feature an exhibition area decided to hacking voting machines, according to a report Tuesday by Politico.
Four out of five surveyed hackers agreed that Apple was right to refuse the FBI's request for a backdoor into the San Bernardino shooter's iPhone. Yet 52 percent said they would help the FBI crack an iPhone's password for a fee.
Brian Laing, VP of business development and products at APT defense firm Lastline, spoke to SCMagazine.com at Black Hat about the evolution of advanced persistent threats and some of their more devious tactics.
The world's biggest networking equipment company, Cisco Systems, will layoff about 5.5K employees.
A researcher claims to have found vulnerabilities in Samsung Pay's tokenization mechanism and its magnetic secure transmission (MST) technology that could allow hackers to steal users' tokens and make fraudulent purchases.
NATO's recent proclamation that cyberspace is an official domain of warfare, along with Russia's reported cyberaggressions against the U.S. and Ukraine, raises interesting questions about how one can responsibly manage cyberwarfare.
In an analysis of five separate manufacturers' web servers running on the new HTTP/2 protocol, cybersecurity firm Imperva found that all five were vulnerable to at least one of four high-profile denial-of-service vulnerabilities.
There would be a lot more happy-go-lucky gamblers in Vegas if ATMs would spit out hundreds of dollars the way Rapid7 made one do in a demo at Black Hat that showed new EMV chip technology is not hack-proof.
Kazakhstan is alleged to be targeting journalists and political dissidents and their families and associates through a cyberespionage campaign.
Of all the security technologies and initiatives introduced to defend against cyberattacks, automatic updates have the best value proposition - creating the most positive and widespread impact at the least cost to practitioners, according to Columbia University researchers.
Cybersecurity firm Sophos recently issued a warning that cyberthreats are becoming more localized in nature. At Black Hat, SCMagazine.com caught up with Sophos's John Shier to discuss these "designer" attacks.
Cybersecurity expert Dan Kaminsky called upon members of the information security community to more openly share innovations, ideas and code to preserve the Internet and its freedoms before they are "regulated into destruction."
After physically demonstrating how to hijack retail point-of-sale transactions - including those using EMV-standard chip cards - two security experts from NCR Corporation offered attendees at Black Hat critical tips on preventing such incidents in real life.
Eighty-three percent of fraudulent money transfers reported to the FBI as the result of business email compromise scams are wired to banks in China and Hong Kong, CNN reported, following an FBI presentation at the International Conference on Cyber Security.
The hackers responsible for reproducing seven master keys used by the TSA to open locks commonly placed on luggage have now duplicated an eighth key in an effort to demonstrate the dangers of digital key escrow policies.
ISA President Larry Clinton urged lawmakers to treat cybersecurity "with a greater sense of urgency," saying in a release that the economics of cybersecurity need to be better integrated into policies.
Communicating with the C-suite depends in part of creating a language they understand and identifying company assets that are most important, panelists told an SC Congress Toronto audience.
SC Congress Amsterdam 2016 opens it's doors today to some of Europe's finest information security practitioners. Check the sessions below and make sure to tweet @scmagazineuk using the #SCAMST hashtag if you have any questions for the speakers!
Automated vulnerability scanners generate large quantities of false positives, resulting in a drain on resources as security engineers chase down bad leads.
A panel of experts at the Association of American Law School conference, that included the FTC's Lesley Fair, discussed how the law can and should respond to data breaches.
When security is built into an organization's risk model it can shift the relationship between the board and information security pros from adversarial to advisory, members of a panel at SC Congress Boston said Thursday.
Companies are struggling with privacy regulations, perhaps no more so than in Massachusetts.
Encryption is complicated and "pretty misunderstood," Miller Newton, president and CEO at PKWare, told SCMagazine.com Monday at a National Cyber Security Association conference held at Nasdaq.
To secure the Internet of Things and to build trust with customers, the way that vendors approach manufacturing, distributing and supporting devices and solutions must change.
The information and knowledge generated by the millions of devices on the Internet of Things are creating a kind of data exhaust that could give rise to security challenges, a panel told attendees Tuesday during an SC Congress New York keynote address.
The number of Internet of Things (IoT) devices is poised to be catapulted into the stratosphere over the next couple of years and the security industry has great opportunity to secure them, according to Michael Kaiser, executive director of the National Cyber Security Alliance (NCSA).
Aerial Assault displayed a drone at DEF CON 23 equipped to fly to and then hack into a corporate network.
As Stephen Scharf moves into newly created CSO position at DTCC, global CISO Mark Clancy assumes helm as CEO at Soltra.
The Electronic Frontier Foundation (EFF) has announced its first DEF CON 23 Badge Hack Contest.
The Federal Trade Commission will share lessons learned from the 54 data security cases it has brought as part of its "Start With Security" program.