Sony Pictures recently canceled the "The Interview" movie release, following hacker threats.
Several were arrested in Operation Torpedo, including former acting HHS cyber director DeFoggi.
The U.S. House of Representatives and the Senate passed to the CyberSecurity Enhancement Act of 2014, giving NIST the go-ahead to develop voluntary cyber standards for critical infrastructure.
The Senate passed the Act on Wednesday after adding a controversial amendment and the House rushed to pass it with little room for debate.
Eric Omuro, who also goes by "Red," ran the site myRedBook.com.
Peter Smith, the husband and lawyer of plaintiff Anna Smith, argued that her Fourth Amendment rights were violated in dragnet surveillance by the NSA.
Meanwhile, an internal email between execs at Sony Pictures and Mandiant, the forensics unit tapped to investigate the breach, leaked to the press.
The reality of ubiquitous reliance on ICT has given rise to the criticality of cyber security, says Cisco CSO Edna Conway.
The NSA intercepted communications from hundreds of email accounts from major cell phone network operators to exploit network weaknesses for surveillance purposes.
U.S. Senator Ron Wyden introduced the Secure Data Act on Thursday to prohibit federal agencies from mandating that backdoors and other security vulnerabilities be built into U.S. software and electronics.
The U.S. House of Representatives unanimously approved three bills, including the Critical Infrastructure Protection Act.
The National Association of Federal Credit Unions is asking Congress to establish national data breach and notification standards for retailers.
Symantec is referring to the malware as 'groundbreaking,' particularly due to the advanced techniques it uses to conceal itself.
The FBI and Homeland Security's US-CERT team have both warned that online scams, taking advantage of the holiday shopping frenzy, will be plentiful this season.
The 29-member Global Commission of Internet Governance Innovation features political leaders, global academics and business leaders that will explore pressing topics in the digital world.
The director of the NSA stated that China, as well as "one or two" other countries, is capable of launching cyberattacks to shut down electric grids and other critical infrastructure in parts of the U.S.
Earlier this month, it was revealed that DOJ uses "dirtboxes" attached to aircrafts to spy on Americans' mobile devices.
Members of the USPS testified before a House subcommittee Wednesday, drawing criticism over the delay in its breach notification to impacted employees.
With more than 400 technical, government and cyber experts involved, Cyber Coalition 2014 tested the speed of sharing threat intelligence.
The USA Freedom Act, aimed at NSA surveillance reform, failed to pick up enough votes to avoid a Republican filibuster.
Veterans Affairs has failed an annual cybersecuirty audit for the 16th year in a row, a new report reveals.
The AP reported on Sunday that the State Department had its unclassified system compromised. The news follows the breach of three other government entities' systems.
Judges in Pierce County, Wash. approved a new requirement that would make law enforcement officials explicitly cite when they plan to use 'stingray' technology during an investigation.
The U.S. Department of Justice is attaching small devices to airplanes that gather massive amounts of mobile phone data, including the data of innocent Americans, a Wall Street Journal report indicates.
The funding will support the development of two new supercomputers.
A Canadian federal bill that would force companies to notify individuals of breaches moved a step closer to being law in October.
British Columbia's provincial government is notifying 15,000 individuals after a privacy breach in its Wildfire Management Branch.
Canada's RCMP cannot tell whether it complies with federal privacy law when gathering information about citizens without a warrant, according to a report.
The Department of Energy contract will allow Norse to support the agency's Cybersecurity Risk Information Sharing Program (CRISP).
Seventeen suspected members of online marketplaces, including Silk Road 2.0's alleged operator, have been arrested.
The government has begun encrypting user data on two websites providing AIDS-related information.
Vladimir Drinkman, who was charged for his involvement in the Heartland breach, is currently in the Netherlands.
This year has been so bad for merchant data breaches that the president felt the need to ensure that the government would offer itself as a more safe and secure place to do business with.
Simulation exercises show how companies should respond under a cyberattack, says HHS's Sara Hall. Teri Robinson reports.
Sen. Charles Schumer of New York has called on federal law enforcement officials to stop "copy cat websites."
The Italian spyware company had its manuals posted online that detail how thoroughly an infected user's actions can be monitored.
The White House experienced a sustained cyberattack on its systems that impacted its network for nearly two weeks.
The unnamed leaker's house was searched and a criminal case was opened after documents about the U.S. government's terrorist watch list were published.
The credential-stealing malware Dyre has been tied to a string of phishing attacks.
An Estonian man, Sergei Tsurikov, was sentenced Friday after helping to steal over $9.4 million from payment processor RBS WorldPay in 2008.
A federal court shut down Pairsys at the request of the Federal Trade Commission.
The attack used a false certificate to trick iCloud users into handing over personal data and login credentials. With an attack of this size, some experts and researchers believe the Chinese government could be to blame.
Speaking at a National Association of State Attorneys General conference, ISA's Larry Clinton asked the AGs to step up efforts to get more resources.
The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.
Reuters reported on Wednesday that DHS is investigating roughly 24 cases of suspected vulnerabilities in medical devices and hospital equipment.
A bill, which would require a national reporting standard, has failed to make it before the Senate or House this year.
Information on half a million federal workers in the government's SmartBuy program went undetected by Chase hackers.
The search engine company updates it piracy report to let users know how its adjusting search results to stop illegal piracy efforts.
President Obama signed an Executive Order at the Consumer Financial Protection Bureau calling for enhanced security measures, including microchips and PINs.
The settlement brings some resolve to the 2012 breach, where the bank lost unencrypted backup tapes.
Jaime Estrada was sentenced to nine months in prison and was ordered to pay a $10,000 fine.
With data breach and fraud alerts in mind, the ABA filed a petition on Tuesday asking the FCC to remove "outdated regulatory restrictions" that prevent sending automated calls and texts to mobile devices.
A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.
National Security Letters (NSLs) tread on the First Amendment and give the FBI too much authority, EFF argued.
The settlement marks the largest FCC enforcement action to date, and also involved the FTC and state attorneys general.
The social media giant believes the limits imposed by the DOJ on data in transparency reports for its users violates its First Amendment rights.
The FCC launched an investigation last year after a consumer complained of the practice.
Cyberwarfare is so new that the ground rules are still being established. Nazan Osman provides an overview.
It's all about what you say and how you say it, says DHS's Phyllis Schneck. Teri Robinson reports.
Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
It's more than a trend. Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely sending and receiving email.
James Comey reportedly said the developments could put consumers "beyond the law."
The contract includes initial tasks totaling $29 million, the U.S. Commerce Department's NIST said.
Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.
The Federal Trade Commission had asked a federal court to shut down the company, which marketed specialized computers to mine bitcoins.
The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework.
Senators introduced the legislation last week as a means of amending the Electronic Communications Privacy Act (ECPA).
The company received more than 100,000 government requests for customer data last year.
Healthcare IT professionals deal with an increasing array of critical security issues that involve privacy, BYOD and network access, managing live-saving medical devices, and ensuring compliance federal regulations.
Yelp will pay $450,000, and TinyCo will pay $300,000 to settle charges that their mobile apps collected information from children under the age of 13.
The top Democrat on the House Oversight and Government Reform Committee asked for a hearing to investigate the CHS breach.
Documents provided by Edward Snowden reveal that the NSA is looking to build a near real-time map of every single internet-connected device in the world.
The Federal Bureau of Investigation has announced that it is prepared to roll out its new fully operational facial recognition system.
Mark Marmilev pleaded guilty on Thursday for his part in a money laundering conspiracy.
Microsoft continues to fight an order requesting it to turn over customer emails stored in a data center in Ireland.
On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector
Administrator Marilyn Tavenner will have to testify in front of the House Committee on Oversight and Government Reform on Sept. 18.
More than 40 civil liberties groups are urging Senate leaders to pass legislation that would put a halt to the NSA's data collection practices.
Business leaders are beginning to fathom the importance of cyber war game simulation exercises, reports James Hale.
Revelations of government surveillance are fueling a paranoia that isn't going to subside. Kate O'Flaherty asks whether firms should be afraid of adopting cloud?
Under the agency's COPPA ruling, website that collect personal information on its young users must receive parental consent before doing so.
Timothy DeFoggi, who was nabbed by the FBI last year in its Operation Torpedo investigation was convicted by federal jury in Nebraska.
The bill would prevent companies from selling students' data and profiting from it.
More than 1,000 analysts at 23 U.S. government agencies have had access to more than 850 billion records courtesy of NSA's ICREACH, a search engine similar to Google.
Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
Claiming funding from the federal government and an endorsement by President Obama, a debt relief program coerced private data from consumers.
The Metropolitan Police have reportedly lobbied for two years to enact the standard.
GMR Transcription Services in California agreed to settle FTC charges related to its security practices.
The Associated Press was denied a request made under the Freedom of Information Act for documents that contain security information on HealthCare.gov.
The NSA program, called "MonsterMind," is reportedly being developed by the intelligence agency.
The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.
The National Bureau of Investigation (NBI) warned that the incident showcases the growing incidence of ATM skimming fraud.
The DEA paid an unnamed Amtrak secretary more than $850,000 for passenger information that it could have attained for free.
After a disastrous rollout of healthcare.gov, the White House has put together a team of private sector gurus to improve federal websites.
In this video, Joshua Corman, CTO at Sonatype, chats with SC Magazine's Danielle Walker on his involvement in some important upcoming initiatives.
Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.
Two USIS clients, the Department of Homeland Security and the Office of Personnel Management, have suspended their contracts as a result of the incident.
The nonprofit group which run Wikipedia was notified by Google of links removed from its search results.
The guidance gives federal agencies improved assessment procedures for securing their information systems and networks.
Sen. Patrick Leahy introduced an NSA reform bill that would update the USA Freedom Act.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access