Most organizations are facing rising threats in their information security risk environment, but over a third have no real-time insight on cyber risks necessary to combat these threats.
Cyber hits on ATMs are getting more frequent, but the authorities seem to be catching up: A man in the UK has been arrested in conjunction with a significant $2.6 million cash machine heist.
More than 200 organizations and 400 cybersecurity professionals from 29 European countries are testing their readiness to counter cyber attacks in a day-long simulation, organized by the European Network and Information Security Agency (ENISA).
Cyber crime costs the global economy an estimated $400 billion a year, and as it grows in scale and sophistication, law enforcement is having to do the same. The U.S. secret service helped prevent over $1 billion in fraud losses from cyber crime last year, but it is up against skilled and organized international crime networks.
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick.
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.
Federal prosecutors have opened a criminal investigation after the FBI raided the home of a suspected second whistleblower who passed on secret government documents about a terror watch list.
A coalition of security researchers has identified a Chinese cyberespionage group that appears to be the most sophisticated of any publicly known Chinese hacker unit and targets not only U.S. and Western government agencies but also dissidents inside and outside China.
Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing emails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.
The University of Texas at San Antonio (UTSA) has been awarded a two-year, $400,000 grant from the Department of Homeland Security (DHS) to develop a DHS Scholars program, aimed toward building a future workforce for federal and private organizations addressing biological and digital threats.
IBM has a new high-speed analysis and criminal investigation software that is designed to uncover hidden criminal threats buried deep inside massive volumes of disparate corporate data.
Samsung's Knox security software for Android devices handles passwords in a way that undermines encryption, an anonymous researcher says.
While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny.
The head of a sophisticated cybercrime ring which stole over $9 million from payment processor Worldpay back in 2008 has been sentenced to a hefty 11 years behind bars.
Cyber-crime is big business in the digital age, so a Bay Area security firm has hired a sophisticated group of hackers to break into computer systems. “White-hat hackers” deliberately break into computer systems and digital devices to find vulnerabilities before “black-hat hackers” can exploit them.