NEWS & ANALYSIS

Researchers Monitoring the Emergence of Mobile Malware Built to Mine Location Data

Security researchers are still trying to wrap their heads around what will come of an emerging trend in mobile malware that extracts a mobile user’s location data.

Morning Security Brief: Internet Piracy, Excessive Force Charges in Seattle, Drones, and More

Online piracy bill stirs heated debate; Former NBA security director says he was fired for reporting how women were treated; Seattle police charged with excessive use of force in federal report; and more.

Morning Security Brief: Cyber Monday Crackdown, Women in Security Awards, Counterterrorism Training to be Reviewed, and More

FBI shuts down 150 Web sites on Cyber Monday. The Women’s Security Council is looking for Women of the Year. U.S. anti-terrorism training under review. And more.

Cyber Monday Provides The Perfect Environment For ‘Package Not Delivered’ Scams

The “Package Not Delivered” scam sends customers an email that looks so legit it’s scary.

Chart: The Cost of Cybercrime

Take a look at the cost of cybercrime by type of attack.

Report Says Utility Smart-Grid Cybersecurity in Chaos

A new report by Pike Research puts it bluntly: utility smart-grid cybersecurity is "in a clear state of chaos."

McAfee Warns of the Twelve Scams of Christmas

McAfee has released its "12 scams of Christmas" to forewarn and forearm consumers and businesses.

Lessons Learned from Trident Breach

A panel of law enforcement experts who spoke at the recent FOSE conference in Washington, D.C., discussed some of the operation’s key lessons and the current state of law enforcement’s anti-cybercrime efforts.

Morning Security Brief: Military Gangs, Nuclear Weapons, Hacker Recruitment, and More

The FBI says gangs are present in every branch of the U.S. military. The last Cold War-era nuclear bomb is dismantled. NSA recruits young hackers. And more.

LulzSec Hackers Get a Lesson in CYA

A proxy service LulzSec hackers used hoping to hide their IP addresses may ultimately become the undoing of the group.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.