Powell, Rice use of private email highlights government-wide security problem

Powell, Rice use of private email highlights government-wide security problem

The Office of the Inspector General (OIG) said Colin Powell and Condeleeza Rice both used private email for classified information and a heavily redacted email from John Kerry showed that he likewise used a private email account

OPM acting director questioned after subpoena from Oversight Committee

OPM acting director questioned after subpoena from Oversight Committee

OPM acting director Beth Cobert questioned about strained relationship with the House Oversight and Government Reform Committee, after receiving subpoena.

UN panel: Assange in "arbitrary detention" in Ecuador's embassy

UN panel: Assange in "arbitrary detention" in Ecuador's embassy

A United Nations panel declared that the past three-and-a-half years that Julian Assange spent in Ecuador's embassy in the U.K. were effectively an "arbitrary detention", as the WikiLeaks founder fights extradition to Sweden.

Russia to spend $250m strengthening cyber-offensive capabilities

Russia to spend $250m strengthening cyber-offensive capabilities

Russia fires a warning shot across the U.S. bows in response to the 'US offensive cyber-threat,' saying that it does not lag behind the U.S. when it comes to cyber-technology, noting that its hackers are among the best.

What does settlement really mean?

What does settlement really mean?

Companies are facing a predicament when charged with federal regulatory violations over alleged failures to establish cybersecurity policies and/or protect personally identifiable information (PII).

Former DOE staffer nailed for attempting spearphishing attack

Former DOE staffer nailed for attempting spearphishing attack

A former Department of Energy (DOE) employee pleaded guilty for attempting spearphishing attacks against other DOE workers.

EFF and ACLU accuse Milwaukee police of warrantless stingray use

EFF and ACLU accuse Milwaukee police of warrantless stingray use

The ACLU joined forces with the EFF to file an amicus brief in a case involving the Milwaukee Police Department's alleged warrantless use of a stingray.

U.S. and EU reach 'Privacy Shield' pact replacing Safe Harbor

U.S. and EU reach 'Privacy Shield' pact replacing Safe Harbor

U.S. and European officials announced a new data-transfer deal on Tuesday designed to replace the Safe Harbor agreement that was ruled invalid by a European court three months ago.

Audit uncovers flaws in U.S.'s 'EINSTEIN' cybersecurity program

Audit uncovers flaws in U.S.'s 'EINSTEIN' cybersecurity program

A new report from the U.S. Government Accountability Office exposes multiple perceived flaws in the Department of Homeland Security's National Cybersecurity Protection System, otherwise known as EINSTEIN.

Intel agencies will target newer, encryption-free tech for surveillance programs: Harvard report

Intel agencies will target newer, encryption-free tech for surveillance programs: Harvard report

A report today from Harvard University's Berkman Center for Internet and Society predicts that in lieu of backdoors to encrypted messaging apps, intelligence agencies will increasingly turn to less fortified vectors to conduct digital surveillance.

Cybercrime for sale

Cybercrime for sale

William Noonan, U.S. Secret Service, says organizations must work together to prevent new threats.

ISIS Cyber Caliphate migrating to new communications platform

ISIS Cyber Caliphate migrating to new communications platform

Cyber Caliphate announced in a post on its Telegram account on Friday that he jihadi hacking group would migrate communications to Threema.

What does settlement really mean?

What does settlement really mean?

What do recent settlements with the FTC, FCC and SEC really mean for cyber hygiene. Larry Jaffee reports.

IRS, FTC initiatives tackle identity theft

IRS, FTC initiatives tackle identity theft

An IRS program launched to improve fraud prevention needs improvements, the Treasury Inspector General for Tax Administration said -- as the FTC rolls out an upgraded identity theft website.

BlackEnergy malware deployed using malicious Word docs

BlackEnergy malware deployed using malicious Word docs

Researchers have spotted attackers using malicious Microsoft Word documents distributed via spearphishing emails to spread the Black Energy Trojan in Ukraine.

In a first, alleged ISIL-linked hacker extradited to U.S.

In a first, alleged ISIL-linked hacker extradited to U.S.

In what prosecutors are calling a "first of its kind" case, a hacker linked to the Islamic State of Iraq and the Levant (ISIL) has been extradited to the U.S. to face charges.

Data Privacy Day: Changes transform policy, perspective since last year

Data Privacy Day: Changes transform policy, perspective since last year

SCMagazine.com asked key thought leaders to identify key events in last year that have reshaped public policy and expectations of what happens—and what should happen—to personally identifiable information when users go online.

White House establishes new office to secure OPM background checks

White House establishes new office to secure OPM background checks

The White House will establish a new office, managed by the DoD, that will secure OPM background checks.

Israel's Electric Authority hit by massive cyberattack

Israel's Electric Authority hit by massive cyberattack

The Israeli Electric Authority was hit by a massive cyberattack during a period of record-breaking power consumption.

Opponents to Swiss surveillance law force direct public vote

Opponents to Swiss surveillance law force direct public vote

A Swiss digital surveillance law that has rankled online privacy advocates will now subjected to a public vote, after opponents collected enough signatures to challenge the legislation.

Lawsuit dismissed in Georgia after state admits to massive breach

Lawsuit dismissed in Georgia after state admits to massive breach

Plaintiffs in Atlanta had a class-action lawsuit dismissed on Monday following the state's acknowledgement it had put at risk the data of more than six million registered voters.

Lucrative pay offered India hackers to work for ISIS

Lucrative pay offered India hackers to work for ISIS

Hackers in India are being handsomely rewarded for taking on work for ISIS.

Maryland AG claims warrantless stingray use didn't violate suspect's rights

Maryland AG claims warrantless stingray use didn't violate suspect's rights

The Maryland Attorney General argued on appeal of a lower court ruling that the warrantless use of a stingray did not violate a suspect's Fourth Amendment right.

Advocacy groups call for repeal Cybersecurity Act of 2015

Advocacy groups call for repeal Cybersecurity Act of 2015

A coalition including the ACLU, FreedomWorks, and other digital privacy advocacy groups sent a letter to members of the House urging them to repeal the Cybersecurity Act of 2015.

FIC 2016: Bernard Cazeneuve says 'do away with internal partitions'

FIC 2016: Bernard Cazeneuve says 'do away with internal partitions'

Bernard Cazeneuve, France's minister of the interior, has called for greater cooperation between states, businesses and citizens in the fight against online radicalisation and cyber-crime.

Carson proposes new agency dedicated to winning 'Cyberspace Race'

Carson proposes new agency dedicated to winning 'Cyberspace Race'

Comparing global cyberspace ambitions to the "Space Race" of the 1960s, Republican U.S. presidential candidate Ben Carson has proposed a National Cyber Security Administration (NCSA) that would consolidate efforts to strengthen and defend America's online assets.

30 years later, CFAA still flawed, needs reform, attorney argues

30 years later, CFAA still flawed, needs reform, attorney argues

In observance of the 30th anniversary of the Computer Fraud and Abuse Act, attorney Peter J. Toren argued that the law remains too vague.

Oversight Committee seeks response from agencies about Juniper

Oversight Committee seeks response from agencies about Juniper

The Senate's Committee on Oversight and Government Reform has requested information from 24 federal agencies and government departments following the illicit code announced by Juniper Networks.

White House hands over background checks to new agency, IT managed by DoD

White House hands over background checks to new agency, IT managed by DoD

The Obama administration is establishing a new agency tasked with conducting background checks on contractors and government employees.

Strasbourg approves unified approach to digital single market

Strasbourg approves unified approach to digital single market

The European Parliament has approved its report, Towards a Digital Single Market Act, with cyber-security a major concern. We speak to Estonian MEP Kaja Kallas.

Microsoft and US government clash over Ireland-held cloud data

Microsoft and US government clash over Ireland-held cloud data

Microsoft has rejected a request by the US government to hand over data the software giant holds in Ireland, claiming that the data in question doesn't belong to the company and raising questions of data jurisdiction.

U.S. Air Force cyberspace weapon first to reach full operational status

U.S. Air Force cyberspace weapon first to reach full operational status

The U.S. Air Force now boasts the first-ever cyberspace weapon system to reach Full Operational Capability status, the military branch announced earlier this week.

FBI indiscriminately used spyware in TorMail investigation, report says

FBI indiscriminately used spyware in TorMail investigation, report says

The FBI is facing allegations from the press that it hacked into the TorMail accounts of innocent people during a 2013 investigation.

Clinton server could have been hacked by foreign adversaries, ex-Pentagon chief

Clinton server could have been hacked by foreign adversaries, ex-Pentagon chief

Classified information on a server belonging to Hillary Clinton may have been hacked by foreign adversaries, ex-Pentagon chief Robert Gates said.

BlackBerry: No, police did not break our encryption

BlackBerry: No, police did not break our encryption

BlackBerry would like its users to know its phones are "as safe as they have always been" after reports that Dutch police are capable of reading encrypted BlackBerry messages.

NSA chief: anti-encryption arguments 'waste of time' as new reports note 'chill' effect

NSA chief: anti-encryption arguments 'waste of time' as new reports note 'chill' effect

The NSA's director, Admiral Mike Rogers, changed his stance on encryption, calling it "foundational to the future."

Document: U.S. gov't OKs exploiting certain zero-days during investigations

Document: U.S. gov't OKs exploiting certain zero-days during investigations

The U.S. government acknowledges in its "Vulnerabilities Equities Process" (VEP) to sometimes condoning withholding information on zero-day vulnerabilities so they can be exploited for intelligence and law enforcement purposes.

New wave of attacks on Ukrainian power plants

New wave of attacks on Ukrainian power plants

Researchers at ESET detected a new wave of cyberattacks on power plants in Ukraine that use different malware than in previous attacks.

Putin's key internet adviser accused of owning a torrent site

Putin's key internet adviser accused of owning a torrent site

Vladimir Putin's key adviser on internet-related affairs was accused of being the owner of a locally operated torrent site.

U.S., Australia vow to take on ISIS cyberthreat together

U.S., Australia vow to take on ISIS cyberthreat together

Australian Prime Minister Malcolm Turnbull and President Obama promised to increase their team effort to combat the ISIS online threat.

Unregulated Chinese firms sell IMSI catchers on black market

Unregulated Chinese firms sell IMSI catchers on black market

Unregulated Chinese tech companies are selling IMSI catchers on the black market to oppressive regimes.

N.Y. State bill calling for smartphone backdoors still in play

N.Y. State bill calling for smartphone backdoors still in play

A bill that languished in the New York State Assembly last year that would require smartphone manufacturers to build a backdoor into their encrypted devices is still alive and could potentially be voted on at some point this year.

ICS-CERT: Manufacturing sees greater share of 2015 critical infrastructure attacks

ICS-CERT: Manufacturing sees greater share of 2015 critical infrastructure attacks

A report from the U.S. Department of Homeland Security's Industrial Control Systems Cybersecurity Emergency Response Team (ICS-CERT) noted a rise in reported cyberattacks against critical manufacturing organizations during 2015.

GOP candidates basically ignore cyber issues during the latest debate

GOP candidates basically ignore cyber issues during the latest debate

Internet security issues took a decidedly back seat during the GOP presidential debate Thursday night with the candidates managing to squeeze in a just few thoughts on encryption, the Office of Personnel Management breach and Eric Snowden.

EU regulators to meet next month on Safe Harbour replacement

EU regulators to meet next month on Safe Harbour replacement

Europe's data protection bodies will meet on February 2 on the data-transfer void left when Safe Harbour was ruled invalid by EU's Court of Justice in October.

Uproar over Wassenaar followed by GAO report on surveillance tech sales to Iran

Uproar over Wassenaar followed by GAO report on surveillance tech sales to Iran

As Congress probed changes to the Wassenaar Arrangement, the Government Accountability Office (GAO) published a report about companies selling surveillance technologies to Iran.

Rep. Amash introduces bill to repeal fledgling Cybersecurity Act

A bipartisan coalition of U.S. House members led by Rep. Justin Amash (R-Mich.) introduced a bill that would repeal recently passed cybersecurity legislation.

Fresno police use 'threat scores' to surveil public

Fresno police use 'threat scores' to surveil public

The Fresno Police Department is currently conducting a trial run of a controversial technology used to profile and develop a "threat score" on people based on their past physical and online activity.

Bush shows teeth; says Clinton 'didn't take cybersecurity seriously'

Bush shows teeth; says Clinton 'didn't take cybersecurity seriously'

Jeb Bush criticized Hillary Clinton's lax cyber policies as secretary of state. "We can't trust someone as our next president who didn't take cybersecurity seriously," he wrote.

Audit: Network of U.S. Nuclear Regulatory Commission not optimized against cyberthreats

Audit: Network of U.S. Nuclear Regulatory Commission not optimized against cyberthreats

An audit of the Security Operations Center (SOC) responsible for securing the U.S. Nuclear Regulatory Commission's (NRC) network infrastructure reveals the SOC's procedures are currently not optimized to meet many cyberthreats.

Teen who reportedly hacked CIA email targeted National Intelligence director

Teen who reportedly hacked CIA email targeted National Intelligence director

Teen involved in hacking the CIA director's email last year is now claiming to have hacked into the National Intelligence director's account.

Education Dept. ripe for breach more devastating than OPM's

Education Dept. ripe for breach more devastating than OPM's

A breach at the Department of Education could be more devastating than the one experienced by OPM, House Oversight Committee Chairman Jason Chaffetz said last week at a Brookings Institute function.

Juniper closes NIST encryption standard believed to contain backdoor

Juniper closes NIST encryption standard believed to contain backdoor

Juniper announced it will close a NIST encryption standard believed to contain a NSA backdoor, first discovered by researcher Bruce Schneier in 2007.

Facebook cookie challenged in EU

Facebook cookie challenged in EU

A court ruling on Monday upped the challenge to Facebook on how the social media site uses a cookie to track data of European citizens.

U.S. utilities warned to beef up defenses following Ukraine attack

Following a cyberattack on a utility provider in the Ukraine, the Electricity Information Sharing and Analysis Center warned its members to improve their network defenses.

Tech big guns confront U.K. parliament on backdoors, encryption

Tech big guns confront U.K. parliament on backdoors, encryption

A group of high tech corporate powerhouses has gathered together to protest a law proposed by the U.K. government that would allow an array of legal and intelligence agencies the ability to access computer data through backdoors and decryption.

Tech execs, U.S. officials to meet about terror groups' social media use

Tech execs, U.S. officials to meet about terror groups' social media use

A meeting between tech executives with White House officials and heads of U.S. intelligence agencies Friday was to be aimed at addressing concerns about terror groups' activities on social media.

Henry Schein to pay $250K to FTC for misleading encryption claims

Henry Schein to pay $250K to FTC for misleading encryption claims

The Henry Schein Practice Solutions, Inc. agreed to pay a $250,000 fine to the FTC for falsely advertising the level of encryption it used to safeguard patient data.

House Small Business Committee grills SBA on weak security

House Small Business Committee grills SBA on weak security

U.S. House Small Business Committee met to discuss several areas of mismanagement at the Small Business Administration (SBA).

Backdoor battle puts encrypted phone vendors in untenable position

Backdoor battle puts encrypted phone vendors in untenable position

Macate, a manufacturer of secure smartphones, is finding itself caught smack dab in the middle of the battle raging between the federal forces looking to require backdoors on encrypted devices and those opposing that idea.

Canadian cyberthreats differ from those in the U.S., report says

Canadian cyberthreats differ from those in the U.S., report says

The United States and Canada may share a common border, but Trend Micro researchers found the country has its own, unique threat landscape.

Dutch government rejects UK government approach to encryption legislation

Dutch government rejects UK government approach to encryption legislation

A position paper written by the Dutch government assesses the arguments for and against encryption backdoors but comes down firmly against downgrading the technology.

Asbestos bill would expose victims' personal data, medical histories

Asbestos bill would expose victims' personal data, medical histories

Privacy and public interest organizations are petitioning against a bill that attempts to prevent fraud in asbestos lawsuits.

Gozi co-author who plead guilty spared more prison time

Gozi co-author who plead guilty spared more prison time

The Latvian man who admitted to co-authoring the notorious banking malware will be spared further jail time.

European Parliament informally agrees GDPR to come into power by 2018

European Parliament informally agrees GDPR to come into power by 2018

The European Parliament informally agreed Tuesday to replace the EU Data Protection Directive 1995 with the General Data Protection Regulation.

Dutch government supports encryption, citing privacy, freedom of expression

Dutch government supports encryption, citing privacy, freedom of expression

As authorities in the US press for weakening encryption standards, the Netherlands government came out in support of encryption technologies.

Anonymous takes credit for shutting down 14 Thai police wesbites

Anonymous takes credit for shutting down 14 Thai police wesbites

Anonymous claimed responsibility for shutting down 14 Thailand police websites on Tuesday amidst police corruption allegations

BBB warns of fake OPM notification letters

BBB warns of fake OPM notification letters

The Better Business Bureau posted a notice to help potential victims of the Office of Personnel Management (OPM) breach and others determine whether letters claiming to be from the OPM are legitimate.

ISIS hacking pro killed in drone strike

ISIS hacking pro killed in drone strike

Siful Haque Sujan, one of the Islamic State's (ISIS) leading hackers, was killed in a Dec. 10 drone strike, according to a release from U.S. Central Command.

Microsoft will notify users of state-sponsored hacking attempts

Microsoft will notify users of state-sponsored hacking attempts

Microsoft unveiled a revised policy to inform users when it believes an account has been targeted by state-sponsored hackers.

U.S. lawmakers communiques snared in NSA surveillance of Netanyahu

U.S. lawmakers communiques snared in NSA surveillance of Netanyahu

The White House continued to keep tabs on some heads of state, including Israeli Prime Minister Benjamin Netanyahu, and the effort yielded information on members of Congress.

Turkey will strengthen cybersecurity after attacks

Turkey will strengthen cybersecurity after attacks

Turkey's presidential spokesman Ibrahim Kalin said the country will bolster its cybersecurity efforts, after its DNS servers were hit with a 40Gbps DDoS attack that hacking group Anonymous took credit for last week.

Russian hackers blamed for power outages in Western Ukraine

Russian hackers blamed for power outages in Western Ukraine

Power outages on Christmas Eve in Western Ukraine have been blamed on Russian special services hackers.

EU calls for controls on surveillance tech exports

EU calls for controls on surveillance tech exports

The European Data Protection Supervisor (EDPS) has called on the EU to strengthen safeguards on the export of surveillance and interception technologies to third world countries.

Records of 191 million voters discovered in a public database

Records of 191 million voters discovered in a public database

Security researcher Chris Vickery discovered a public database containing the voter records and personal information of 191 million registered voters.

Israeli missile defense chief dismissed for breach of security protocol

Israeli missile defense chief dismissed for breach of security protocol

Israel's Defense Ministry dismissed Yair Ramati, the nation's head of missile defense, for a "grave breach of information security."

China's legislature approves much maligned anti-terrorism law

China's legislature approves much maligned anti-terrorism law

China's legislature approved an anti-terrorism law that was opposed by business groups, President Obama, and human rights organizations.

Senator Burr, EFF's Cohn debate backdoors and encryption

Senator Burr, EFF's Cohn debate backdoors and encryption

Sen. Richard Burr (R-NC) and Cindy Cohn, executive director of the Electronic Frontier Foundation, went head to head over the weekend over the issue of encryption.

China, US signal a cyber policy 'arms race'

China, US signal a cyber policy 'arms race'

China's anti-terrorism legislation is the latest escalation in a race between China and Western government to enact aggressive surveillance policy.

Catch and release: Computer law

Catch and release: Computer law

Is it possible for legislative developments to keep up with the rate of innovation among hackers?

Treasury IG urges IRS to fix programming error

Treasury IG urges IRS to fix programming error

The Treasury Inspector General for Tax Administration is pushing for the IRS to improve its taxpayer authentication.

Morgan Stanley adviser sentenced for hacking firm's network

Morgan Stanley adviser sentenced for hacking firm's network

A former financial adviser at Morgan Stanley received a sentence of three year's probation for his illegal accessing of the firm's confidential client data.

Europol highlights barriers to investigating child abuse material

Europol highlights barriers to investigating child abuse material

Report draws on expertise of 35 specialist law enforcement officers to highlight how perpetrators of child abuse material are using technology to hide their crimes.

DOJ investigates Uber breach, including Lyft allegations

DOJ investigates Uber breach, including Lyft allegations

The DOJ is investigating the May 2014 Uber breach including allegations against Lyft employees.

Anonymous fesses up to DDoS attacks on Turkish servers

Anonymous fesses up to DDoS attacks on Turkish servers

Anonymous has admitted responsibility for a huge 40Gbps DDoS attack that took place last week on Turkish DNS Servers

Two more Sanders' staffers axed over breach of Clinton database

Two more Sanders' staffers axed over breach of Clinton database

Two more individuals were suspended from the staff of presidential candidate Bernie Sanders for inappropriate access to Hillary Clinton's voter database.

Pentagon may boost online attacks against the Islamic State

Pentagon may boost online attacks against the Islamic State

The Pentagon is looking to go on the cyber offensive against the Islamic State (IS) in an effort to limit the terror organization's online capability.

Encryption, surveillance discussed on CFR panel on homeland security, ISIS

Encryption, surveillance discussed on CFR panel on homeland security, ISIS

Members of a panel on the "Homeland Security Implications of ISIS Attacks" at the Council on Foreign Relations talked about encryption and surveillance in the effort to defeat terrorist groups.

Industry pros, tech firms displeased with cyber bill

Industry pros, tech firms displeased with cyber bill

Cybersecurity legislation buried within a $1.1 trillion government spending agreement that was needed to prevent a government shutdown got the nod from the House.

LifeLock to pay record $100 million settlement with FTC

LifeLock to pay record $100 million settlement with FTC

The Federal Trade Commission (FTC) today approved a $100 million settlement with LifeLock over a 2010 contempt charge, the largest such payout in FTC history.

Pentagon short-handed in fight against cyber attackers

Pentagon short-handed in fight against cyber attackers

The Pentagon is in desperate need of reinforcements to prepare to fight in cyberspace with many of its most highly qualified security experts leaving the military for better paying jobs.

Russian hacker facing U.S. trial after challenge dismissed

Russian hacker facing U.S. trial after challenge dismissed

A Russian accused of hacking American businesses will face trial after a judge on Tuesday dismissed a lawyer's challenge over a technicality.

Cyber bill reportedly included in omnibus deal

Cyber bill reportedly included in omnibus deal

The omnibus spending deal is reported to include the final text of a major cybersecurity bill that legislators have been working to merge since October.

Encryption, closing internet debated by Republican presidential hopefuls

Encryption, closing internet debated by Republican presidential hopefuls

Encryption and the openness of the internet took center stage at Tuesday's Republican debate, with presidential hopeful Carly Fiorina calling for Silicon Valley to help government solve its "tech problem" and circumvent encryption.

Army National Guard announces 13 new cyber units across 23 states

Army National Guard announces 13 new cyber units across 23 states

The U.S. Army National Guard announced new cyberdefense measures that will enable greater cyber protection capabilities in every state.

Catch and release: Computer law

Catch and release: Computer law

Is it possible for legislative developments to keep up with the rate of innovation among hackers? Jeremy Seth Davis investigates.

Keep it private: Security/privacy

Keep it private: Security/privacy

Privacy is not a new concept but it's one that gathered steam in 2015 as it faced threats and found renewed support. Teri Robinson reports.

Border crossing: Global cooperation

Border crossing: Global cooperation

A number of criminal cyber operations were taken down this year owing to international cooperation between law enforcement agents. Ashley Carman reports.

OPM mishandled contract for identity protection services, IG says

OPM mishandled contract for identity protection services, IG says

The Office of Personnel Management (OPM) got hammered yet one more time for breaches that laid the agency low earlier this year as a report from the Inspector General's office took it to task for the way it awarded a contract to a firm charged with providing identity protection services to those affected by the hacks.

Comey calls encryption a business model issue, raises hackles of privacy advocates

Comey calls encryption a business model issue, raises hackles of privacy advocates

While Federal Bureau of Investigation (FBI) Director James Comey didn't make the case that encrypted communications aided terrorists who launched attacks in San Bernadino, Calif., and Paris, in testimony Wednesday before the Senate Judiciary he pleaded his case for tech companies to allow government access to encrypted data.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US