Government News, Articles and Updates

Clinton Campaign systems hacked

Clinton Campaign systems hacked

By

The Justice Department's national security division is looking into a breach of the Clinton Campaign's computer network.

FBI posts 'Cyber's Most Wanted' list

FBI posts 'Cyber's Most Wanted' list

By

The FBI has posted a "Cyber's Most Wanted" list to appeal to the public for help in nabbing a number of criminals wanted for crimes involving computers, bank fraud and other nefarious online schemes.

ACLU Utah, ACLU motion challenges DEA warrantless access to Utah drug database

ACLU Utah, ACLU motion challenges DEA warrantless access to Utah drug database

By

The American Civil Liberties Union of Utah and the ACLU have taken to the courts to challenge the DEA's warrantless access of private prescription records from the Utah Controlled Substance Database.

Report: Majority of BEC scams reported to FBI had funds wired to China and Hong Kong

Report: Majority of BEC scams reported to FBI had funds wired to China and Hong Kong

By

Eighty-three percent of fraudulent money transfers reported to the FBI as the result of business email compromise scams are wired to banks in China and Hong Kong, CNN reported, following an FBI presentation at the International Conference on Cyber Security.

FBI creates new senior-level data scientist position, calls for applicants

FBI creates new senior-level data scientist position, calls for applicants

By

The FBI is looking for candidates to fill its brand-new position of senior-level data scientist, a role requires specialization in big-data analytics and whose responsibilities include serving as a top advisor and consultant to Cyber Division executives.

Arab-American org joins privacy groups in DNC anti-surveillance push

Arab-American org joins privacy groups in DNC anti-surveillance push

By

An Arab-American policy organization has joined with civil liberties and privacy groups to address domestic surveillance policies that target Arab American and American Muslim communities.

U.K. testing social media logins for authentication

U.K. testing social media logins for authentication

By

To enhance the use of its web portal, gov.uk, the U.K. government is testing the use of its subscribers' social media logins as an authentication method.

Feds nix SMS-based 2FA

Feds nix SMS-based 2FA

By

Government service providers will be required to phase out the use of SMS-based two-factor authentication (2FA) as the result of new guidelines from the National Institute of Standards and Technology (NIST).

Privacy implications in store for users of "Trump Yourself"

Privacy implications in store for users of "Trump Yourself"

A new Facebook app from Hillary Clinton's presidential campaign which invites users to "Trump Yourself" could contain privacy implications.

[Updated with video] Final arguments heard in Lauri Love extradition case

[Updated with video] Final arguments heard in Lauri Love extradition case

Counsel for Lauri Love and the US government rehearsed their final arguments as Tom Reeve reports from Westminster Magistrates' Court yesterday.

Law enforcement community meets to discuss balancing privacy and cybercrime

Law enforcement community meets to discuss balancing privacy and cybercrime

By

Members will discuss and examine the challenges of balancing privacy and fighting cybercrime.

Feds would benefit from adoption of IoT, analysis finds

Feds would benefit from adoption of IoT, analysis finds

By

The federal government would greatly benefit from implementation of Internet of Things technology, but few agencies are taking advantage, says the Center for Data Innovation.

Trump's Russian interests and Guccifer 2.0

Trump's Russian interests and Guccifer 2.0

By

A flood of information has emerged that connects GOP presidential nominee Donald Trump to a questionable cast of characters who are linked to Russian interests.

Russian hackers take the stage at DNC convention

Russian hackers take the stage at DNC convention

By

The email dump underscored the holes in security and privacy yawning at many organizations and the very real possibility that nation-states like Russia have upped their game to manipulate the democratic process.

TSA master key hackers expose dangers of physical and digital key escrow policies

TSA master key hackers expose dangers of physical and digital key escrow policies

By

The hackers responsible for reproducing seven master keys used by the TSA to open locks commonly placed on luggage have now duplicated an eighth key in an effort to demonstrate the dangers of digital key escrow policies.

Estonia in talks to back up data in U.K.

Estonia in talks to back up data in U.K.

By

Fearing a Russian cyberattack, Estonia is reportedly negotiating with the U.K and Luxembourg governments to store citizen data in the U.K.

Illinois ACLU applauds new stingray regulation

Illinois ACLU applauds new stingray regulation

By

The ACLU of Illinois applauded Governor Bruce Rauner's Friday signing of legislation regulating stingray use as a "measure that increases transparency."

Proliferation of hacker culture helped keep Anonymous from being branded terrorist org

Proliferation of hacker culture helped keep Anonymous from being branded terrorist org

By

How has Anonymous avoided being labeled as a terrorist group? That is a serious question that was proposed by an anthropologist during the HOPE Conference in New York City.

Three charged in Florida federal court for global mobile telecom scam

Three charged in Florida federal court for global mobile telecom scam

By

Three defendants were charged in federal court on Friday for their role in a global telecommunications fraud conspiracy that compromised mobile phone users' accounts and cloned their cell phones to make unauthorized illegal international calls.

Authorities blocked from accessing accused's iPhone

Authorities blocked from accessing accused's iPhone

By

A man sitting in jail on charges of sex trafficking was ordered by a federal judge to unlock his iPhone, but so far his attorney has succeeded in blocking the order on constitutional grounds.

WhatsApp in the spotlight after Turkey publishes messages of coup officers

WhatsApp in the spotlight after Turkey publishes messages of coup officers

By

WhatsApp messages of military officers involved in Turkey's attempted coup were published by the country's state-run media outlets.

Audit: FBI's threat prioritization process too subjective and sluggish

Audit: FBI's threat prioritization process too subjective and sluggish

By

The FBI's process for prioritizing cyberthreats is too slow and subjective, hindering its ability to optimize allocation of resources to address these dangers, according to a new report from the DoJ's Office of the Inspector General.

MS-ISAC official: Ransomware top priority

MS-ISAC official: Ransomware top priority

By

Ransomware threats targeting government IT systems nationwide at the state and local level are steadily increasing.

BlackBerry CEO calls helping law enforcement 'civic duty,' takes swipe at Apple

BlackBerry CEO calls helping law enforcement 'civic duty,' takes swipe at Apple

By

Cooperating with law enforcement is "our basic civic responsibility," BlackBerry CEO John Chen told reporters at a media Q&A at the BlackBerry Security Summit in New York.

Alleged owner of world's most visited BitTorrent site arrested

Alleged owner of world's most visited BitTorrent site arrested

By

A Ukrainian man was arrested Wednesday in Poland for allegedly owning and operating one of the world's largest BitTorrent distribution sites.

'Right Sector' hackers attempt to blackmail Polish government

'Right Sector' hackers attempt to blackmail Polish government

By

A group claiming to be a far-right Ukrainian nationalist group has attempted to blackmail the Polish ministry of defence.

Library of Congress systems back to normal after four-day DDoS attack

Library of Congress systems back to normal after four-day DDoS attack

By

After a four-day long DDoS assault, the Library of Congress announced its computer systems have returned to normal.

Wassenaar Arrangement 'inhibits international cyber-security efforts'

Wassenaar Arrangement 'inhibits international cyber-security efforts'

The Wassenaar Arrangement for regulating the international arms trade is threatening to choke the international cyber-security community and ultimately make us less secure, an audience at RSA Singapore heard.

Google recieved record number of data requests: 4,677 in latest transparency report

Google recieved record number of data requests: 4,677 in latest transparency report

By

Google's latest transparency report displays a continued increase in data requests the company received from government authorities.

Turkey blocks access to WikiLeaks after 300K emails released

Turkey blocks access to WikiLeaks after 300K emails released

By

Turkey blocked access to WikiLeaks after almost 300,000 emails from the Justice and Development Party (AKP Party) were released Tuesday.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US