Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
US/North America News Reporter, Infosecurity Magazine
66% of respondents faced increased security risks due to this workforce shortage.
The Crowdsourced Security Initiative will be a full-scale launch following the successful Hack the Pentagon pilot program.
The DDoS attack targeted New Hampshire-based company Dyn and its managed DNS infrastructure.
The Shellphish team is the same team that won bronze at the DARPA-sponsored Cyber Grand Challenge over the summer.
Millions of Apple iOS mobile devices are leaking information like the exact location of devices and their owners.
The Kremlin-tied group has created legions of custom programs, backdoors, bootkits and rootkits to assist it in its spying.
TrickBot shares much in common with the Dyre malware, which became notorious in late 2014 and early 2015.
A large cluster of attacks against game developers uses malware designed to harvest stored passwords and log keystrokes.
Those who do not prioritize security in the hardware life cycle process have a high rate of unknown malware occurrences (73%).
They took 59,000 research files on the use of tritium, also known as Hydrogen-3, which is a key component of hydrogen bombs.
The average business expects to be dealing with 7,000 IoT devices over the next 18 months.
Russian hackers skimmed credit-card data for the past six months from the National Republican Senatorial Committee’s site.
Congress is concerned about reports that Yahoo! created a specialized program to scan email messages for certain trigger phrases.
The Dojo mobile game teaches young children and their families about computer science, cybersecurity and safety.
The final round of the High School Forensics Challenge (HSF) will be at NYU Tandon in Downtown Brooklyn and at NYU Abu Dhabi.