Roughly 2,000 Chicago Public Schools students who participated in a free vision examination program may have had personal information compromised.
Microsoft announced on Wednesday that it would be improving and expanding its security to protect customer data amid growing concerns of government surveillance.
The agency makes use of the sweeping surveillance practice employing a sophisticated tool called "co-traveler," which essentially tracks bystanders interacting with targets.
Adobe breach affects 38 million, UK man indicted for hack of U.S. Army network, NIST debuts new cyber security framework, and other news.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.
Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal rights to privacy.
In addition to internet service providers (ISPs) making use of real-time response capabilities, a cyber security report suggested several other steps to stave off threats to the nation.
The National Security Agency is said to have infected more than 50,000 computer networks worldwide with malware that steals information.
Security spending will grow 10 fold in the next decade, a chief research analyst predicts, providing needed investments to address growing surveillance concerns.
The troublesome CryptoLocker malware has claimed another victim: a Massachusetts police department.
Yahoo announced that it never gave out user information to government agencies and that data moving between its centers will be encrypted.
According to an FBI memo obtained by Reuters, hackers exploited vulnerable Adobe software to infiltrate organizations' networks.
For the first time, the Obama administration has publicly addressed security threats to healthcare.gov, including a denial-of-service attack.
The number of times Google has complied with those demands has decreased.
Canada's banking regulator has issued a set of cyber security guidelines for financial institutions, warning that banks must be on the lookout for online fraudsters.
Canadian lawmakers are seeking to legislate more oversight of Canada's secretive spy agencies, arguing that citizens don't know enough about what they're doing.
The planned event, called "Waking Shark II," marks the second year the city of London had participated in the security preparedness exercises.
A 42-year-old NYPD detective pleaded guilty on Friday to one count of computer hacking and one count of conspiring to commit computer hacking.
The British intelligence agency used a sophisticated exploitation tool, called "Quantum Insert," to trick telecom workers, a German newspaper revealed.
Silk Road 2.0 has launched on the Tor network about one month after the FBI took down the original illicit online marketplace and indicted its alleged operator, 29-year-old Ross Ulbricht.
The tech giant revealed the information via its first transparency report.
Microsoft issued an advisory on Tuesday warning users of a zero-day vulnerability being exploited in targeted attacks using emailed Microsoft Office documents.
The agency, which releases cryptographic standards for the security industry, launched the evaluation in light of NSA surveillance revelations
As a result of the growing NSA revelations, the social micro-blogging site is upping its defenses by planning to encrypt its direct messaging Service.
This month's news briefs include important advisories issued by RSA and NIST, as well as a critical update released by Microsoft.
It has been slow, buggy and downed since it launched on Oct. 1. Now security professionals explore just how vulnerable the healthcare.gov website really is to attackers.
On Tuesday, Sen. Patrick Leahy, D-Vt., and Congressman Jim Sensenbrenner, R-Wisc., introduced the USA Freedom Act.
The Washington Post published the latest information disclosed by whistleblower Edward Snowden.
Lauri Love, a 28-year-old UK man, was arrested at his home Friday by British police cooperating with U.S. law enforcement.
Rumors on the internet are that an Anonymous-related DDoS attack is why the National Security Agency website went down around 5:15 p.m., Eastern Time, on Friday.
A Connecticut man, arrested by the FBI and charged with fraudulently obtaining hundreds of Cisco computer networking parts, is now facing up to 20 years in prison for mail fraud.
A draft of the voluntary framework was released by NIST in support of President Obama's executive order on critical infrastructure security.
The government failed to respond to a FOIA request submitted back in March, the civil liberties group claims.
Security company Quarkslab concluded that Apple's popular iMessage instant messaging system is vulnerable to decryption via man-in-the-middle attacks.
Sen. Dianne Feinstein said the program only collects phone data not protected under the Fourth Amendment.
Since NIST has no regulatory or statutory authority to enforce its use, the Framework must include specific information and guidance that business leaders will want to follow.
In a TV interview, Cheney revealed that the wireless feature of his defibrillator was disabled due to concerns of an assassination attempt.
On Friday, President Obama officially nominated Jeh Johnson, a former Pentagon lawyer, for the role of Homeland Security secretary.
In a white paper on its security approach, Huawei said that it has never been asked by any government to provide customer data or access to its technology.
As criticism of NSA's surveillance tactics cloud his eight-year tenure, reports have surfaced that Gen. Keith Alexander plans to leave the role soon.
NSA Director Keith Alexander admitted at a congressional committee meeting this week that phone surveillance programs thwarted a couple of terror plots, not 54 as he previously stated.
More people have been arrested and charged following an FBI takedown of the underground Silk Road black market earlier this month.
State legislators are drafting bills that would punish individuals who humiliate former flames by posting nude photos.
Two controversial pieces of privacy legislation have been killed after Canada's prime minister prorogued parliament.
The city of Wichita had its website hacked over the weekend, consequently compromising sensitive information for tens of thousands of current and former vendors and employees.
The Federal Bureau of Investigation's shutdown of Silk Road - a black market existing on the Deep Web and accessible through the Tor network - also led to the arrest of its 29-year-old operator, Ross Ulbricht.
Security experts warned that the lack of eyes on company networks could bring an increase in attempts to infiltrate organizations' networks.
In this month's debate, experts discuss whether the Computer Fraud and Abuse Act is out of date, and if punishments are disproportionate to offenses.
This month's new briefs include insight on the PCI Security Standards Council, DDoS attacks aimed at financial institutions, and more.
Lawmakers in California and North Dakota signed legislation that better reveals how consumers' personal information is used and what constitutes compromised data.
Extensive National Security Agency surveillance has led four senators to introduce a reform initiative designed to maintain privacy without impeding security.
The hired individual would ensure that NSA doesn't violate public privacy or civil liberties in its quest to maintain national security, the job posting says.
A proposal released Tuesday addresses much needed updates to New York State's white collar laws, including cyber crime, which have remained mostly unaltered since 1965.
On Tuesday, Senator Dianne Feinstein, D-Calif., revealed that the draft bill was in the works and she planned to move forward with the legislation.
California Gov. Edmund "Jerry" Brown signed the legislation on Monday.
RSA has agreed with NIST's recommendation to stop using an encryption algorithm that may be compromised by a backdoor.
Information security is in place not only to make ourselves more resilient to threats, but to create a mutually established trust with which we can communicate with reasonably expected results.
Based in France, Vupen is known for selling zero-day exploits, a practice that has long been debated in the security industry.
A U.S. federal agent testified that an FBI takeover of a server on the anonymous Tor network led to the arrest of a 28-year-old Irishman charged with distributing child pornography.
A federal appeals court upheld a ruling that Google's data collection practices are not exempt from federal wiretap law.
A spreadsheet posted online contained sensitive information on nearly 1,000 clients of Pierce County Housing Authority in Washington.
According to leaked documents, the NSA and its U.K. equivalent have used their expansive resources to undermine encryption methods widely used to secure internet communications.
Only days after NSA's mission to crack widely used internet encryption methods went public, Gen. Keith Alexander pulled out of the event, the company hosting the conference announced.
AnonGhost has been hard at work penetrating systems and leaking personal information in preparation for a Sept. 11 cyber attack.
A Georgia Department of Labor employee inadvertently put thousands at risk after sending out an email containing their personal data.
The case hinges on a 2012 breach where the live video feeds of nearly 700 web-connected cameras were made available online.
Unhappy with the political climate in Azerbaijan, a group claiming to be an Armenian sect of hacktivist collective Anonymous has leaked documents and photos related to the country's leading energy company, Azerenergy.
A Hill Air Force Base employee looking to work from home had to be "dealt with" after emailing personal information on hundreds of colleagues to his unprotected personal email address.
The Syrian Electronic Army apparently pulled off the defacement to encourage American troops to stay out of the conflict in Syria.
We CISOs and CSOs are the generals in the global cyber war. If you haven't thought about your role in these terms, then you are ripe for ambush.
The document was born out of President Obama's executive order to enhance critical infrastructure protection.
Andrew Miller of Pennsylvania pleaded guilty Tuesday to conspiracy and computer intrusion charges that could net him up to 20 years behind bars.
Facebook has released its first-ever transparency report, a document breaking down the number of worldwide government requests for data on users. Not surprisingly, the U.S. is far and away the leader.
APT12, the espionage group believed to be behind attacks on The New York Times, is piggy-backing on international interest in the G20 summit to penetrate victims' networks via malicious emails.
According to an internet affairs agency in the country, the most intense segment of the attacks occurred early Sunday.
As of Sunday, telecommunications and internet service providers in the EU must notify authorities of a data breach within 24 hours. How would such a law be received in the United States?
It used to be that organizations were concerned about migrating their data to the cloud out of fear of hackers or disgruntled insiders. But Edward Snowden's NSA leaks show there's a new threat actor: the government. Encryption can help.
The U.S. Department of Energy is alerting some 14,000 current and past employees that personally identifiable information was accessed in a "cyber incident."
Employees for and applicants to the linguist program of Virginia-based defense contractor Northrop Grumman may have had sensitive information compromised when a related database was accessed by an unauthorized party.
Extradition was suspended for a 28-year-old Latvian man charged with co-authoring and co-distributing the Gozi virus.
The tentative list of incentives would entice companies to participate in the "Cyber Security Framework," a measure that aims to help the nation stave off industrial attacks.
Jason healey, director of the Cyber Statecraft Initiative at the Atlantic Council, discusses cyber security at the national level.
Unrevised for more than eight years, the best practices documents are now available for free download.
Did the FBI exploit a Tor-related vulnerability to track down an accused child porn trafficker, and, in the process, compromising the anonymity of "dark net" users?
When it comes to threat intelligence, the federal government is too restricted and resource starved to provide much good for the private sector.
The nation's top spymaster dodged some audience disruption in an attempt to assuage the audience of security professionals that the NSA's programs are legal and necessary.
Sens. Sheldon Whitehouse, D-R.I., and Lindsey Graham, R-S.C., have drafted a bill to amend the Economic Espionage Act.
SEC employee data was discovered on the computer network of a separate agency.
The hacker collective Anonymous releases a third and final round of FEMA contacts.
More than 1,000 early-bird members of the bike-sharing program had their account information, including credit card numbers, briefly exposed.
If an FTC suit against Wyndham is dismissed, it may force the regulator to do more to fine companies accused of poor data security practices.
Security experts say the fledgling e-currency has its upsides for online trading, but the true extent of its payoff for online criminals is yet to be seen.
Hacker collective Anonymous has released a second list of FEMA contact information and asserted its system compromise is real.
A study from the California's attorney general closely examines recent breaches in a state whose notification law is now a decade old.
The Indianapolis-based health insurer must pay the Department of Health and Human Services $1.7 million to avoid heftier fines under HIPAA for its 137-day long breach ending in 2010.
The FTC says it wants businesses to improve data security for consumers, but two companies that were victims of data breaches believe the governing agency is overstepping its bounds.
The intruder "Guccifer" has apparently struck again, following up on his attacks of other high-profile people, including the family and friends of former President George H.W. Bush.
The conference's founder, Jeff Moss, who happens to sit on a U.S. government advisory board, said recent revelations about the NSA's vast surveillance program has made attendees "uncomfortable" about fed presence at the show this year.
The California Bureau of Automotive Repair notified Smog Check station owners in July that banking information may have been accessed in a January data breach.