Attackers exploited a zero-day vulnerability in Windows to spy on NATO, the European Union, Poland, Ukraine, private energy organizations, and European telecommunications companies, according...
Hi, what are you looking for?
Attackers exploited a zero-day vulnerability in Windows to spy on NATO, the European Union, Poland, Ukraine, private energy organizations, and European telecommunications companies, according...
WASHINGTON, D.C. - MIRCON - Organizations understand the importance of incident response planning, but they remain woefully unprepared when it comes to giving investigators...
Outlier Security, a startup co-founded by former HBGary CEO Greg Hoglund emerged from stealth mode today with a new approach on how enterprises can...
UPDATE - Yahoo!
In a two-year study of information about critical control systems directly connected to the Internet, researchers found mining equipment, a surprising number of wind...
The war of words escalated this week between Palo Alto Networks and independent testing firm NSS Labs over the latest group test on next-generation...
When CSOs are asked about their top IT security concerns, mobile devices and apps almost always make the top three issues. However, a recent...
The United States Secret Service estimated more than 1,000 businesses have been infected by the "Backoff" point-of-sale malware, and many of them are unaware...
Attackers are playing on the hype around the crypto-currency Bitcoin to cast a wider phishing net looking for victims. It's not just bank credentials...
Cyber-attackers backed by China have conducted “a series of apparently targeted, sophisticated cyber-attacks” against activists representing the Uyghurs, a religious minority in China, a...
A group of security researchers called upon automobile manufacturers to build cyber-security safeguards inside the software systems powering various features in modern cars.
Kaspersky Lab said that it has discovered how victims of an ongoing massive cyber espionage campaign were infected, shedding light on questions previously left...
Pwn Pulse Combines “Hack-in-a-box” Sensors with Central Management for Remote Location Intelligence
Only 3 percent of external-facing servers in the world's largest companies have been fully protected from the Heartbleed vulnerability, researchers found.
A serious vulnerability exists in the Android operating system, which could allow malicious apps to impersonate well-known trusted apps such as Google Wallet, researchers...
Senate Subcommittee on Crime and Terrorism Conducts Hearing on Botnets and Cybercrime
Senate Committee Approves Cybersecurity Information Sharing Act, But Privacy Groups Raise Concerns Over Government Access to Personal Data on U.S Citizens
A group operating under the name Tunisian Hackers Team are targeting the websites of government agencies and large organizations with distributed denial of service...