Government

Obama goes hard on cybersecurity, new CNAP commits funds, resources

Obama goes hard on cybersecurity, new CNAP commits funds, resources

By

President Obama's Cybersecurity National Action Plan (CNAP) includes a significant dollar commitment in the fiscal 2017 budget and the creation of a Cybersecurity Commission and a Privacy Council established under two Executive Orders

NSA reorg could strengthen defense ops

NSA reorg could strengthen defense ops

By

The National Security Agency unveiled an ambitious reorganization that pulls together the agency's offensive and defensive operations.

Pro-Palestine hacktivist makes good on threat, posts data on FBI and DHS personnel

Pro-Palestine hacktivist makes good on threat, posts data on FBI and DHS personnel

By

The hacker responsible for breaching the Department of Justice's web portal has publicly posted stolen data corresponding to roughly 20,000 employees of the FBI and 9,000 from the Department of Homeland Security.

Draft Investigatory Powers Bill draws fire from Parliamentary committee

Draft Investigatory Powers Bill draws fire from Parliamentary committee

Myriad flaws in the draft Investigatory Powers Bill were highlighted by the Intelligence and Security Committee of Parliament, calling into question government's commitment to privacy

Hacker threatens to expose info on DHS, FBI employees

Hacker threatens to expose info on DHS, FBI employees

By

A hacker threatened to release information on 20,000 FBI employees and 9,000 who work for the Department of Homeland Security (DHS).

Draft bill seeks to improve U.S. military cyber warfare capabilities

Draft bill seeks to improve U.S. military cyber warfare capabilities

By

Draft legislation seeks to improve the Pentagon's ability to quickly develop and acquire process cyber warfare technologies.

Powell, Rice use of private email highlights government-wide security problem

Powell, Rice use of private email highlights government-wide security problem

By

The Office of the Inspector General (OIG) said Colin Powell and Condeleeza Rice both used private email for classified information and a heavily redacted email from John Kerry showed that he likewise used a private email account

OPM acting director questioned after subpoena from Oversight Committee

OPM acting director questioned after subpoena from Oversight Committee

By

OPM acting director Beth Cobert questioned about strained relationship with the House Oversight and Government Reform Committee, after receiving subpoena.

UN panel: Assange in "arbitrary detention" in Ecuador's embassy

UN panel: Assange in "arbitrary detention" in Ecuador's embassy

By

A United Nations panel declared that the past three-and-a-half years that Julian Assange spent in Ecuador's embassy in the U.K. were effectively an "arbitrary detention", as the WikiLeaks founder fights extradition to Sweden.

Russia to spend $250m strengthening cyber-offensive capabilities

Russia to spend $250m strengthening cyber-offensive capabilities

Russia fires a warning shot across the U.S. bows in response to the 'US offensive cyber-threat,' saying that it does not lag behind the U.S. when it comes to cyber-technology, noting that its hackers are among the best.

 What does settlement really mean?

What does settlement really mean?

By

Companies are facing a predicament when charged with federal regulatory violations over alleged failures to establish cybersecurity policies and/or protect personally identifiable information (PII).

Former DOE staffer nailed for attempting spearphishing attack

Former DOE staffer nailed for attempting spearphishing attack

By

A former Department of Energy (DOE) employee pleaded guilty for attempting spearphishing attacks against other DOE workers.

EFF and ACLU accuse Milwaukee police of warrantless stingray use

EFF and ACLU accuse Milwaukee police of warrantless stingray use

By

The ACLU joined forces with the EFF to file an amicus brief in a case involving the Milwaukee Police Department's alleged warrantless use of a stingray.

U.S. and EU reach 'Privacy Shield' pact replacing Safe Harbor

U.S. and EU reach 'Privacy Shield' pact replacing Safe Harbor

By

U.S. and European officials announced a new data-transfer deal on Tuesday designed to replace the Safe Harbor agreement that was ruled invalid by a European court three months ago.

Audit uncovers flaws in U.S.'s 'EINSTEIN' cybersecurity program

Audit uncovers flaws in U.S.'s 'EINSTEIN' cybersecurity program

By

A new report from the U.S. Government Accountability Office exposes multiple perceived flaws in the Department of Homeland Security's National Cybersecurity Protection System, otherwise known as EINSTEIN.

Intel agencies will target newer, encryption-free tech for surveillance programs: Harvard report

Intel agencies will target newer, encryption-free tech for surveillance programs: Harvard report

By

A report today from Harvard University's Berkman Center for Internet and Society predicts that in lieu of backdoors to encrypted messaging apps, intelligence agencies will increasingly turn to less fortified vectors to conduct digital surveillance.

 Cybercrime for sale

Cybercrime for sale

By

William Noonan, U.S. Secret Service, says organizations must work together to prevent new threats.

ISIS Cyber Caliphate migrating to new communications platform

ISIS Cyber Caliphate migrating to new communications platform

By

Cyber Caliphate announced in a post on its Telegram account on Friday that he jihadi hacking group would migrate communications to Threema.

What does settlement really mean?

What does settlement really mean?

By

What do recent settlements with the FTC, FCC and SEC really mean for cyber hygiene. Larry Jaffee reports.

IRS, FTC initiatives tackle identity theft

IRS, FTC initiatives tackle identity theft

By

An IRS program launched to improve fraud prevention needs improvements, the Treasury Inspector General for Tax Administration said -- as the FTC rolls out an upgraded identity theft website.

BlackEnergy malware deployed using malicious Word docs

BlackEnergy malware deployed using malicious Word docs

By

Researchers have spotted attackers using malicious Microsoft Word documents distributed via spearphishing emails to spread the Black Energy Trojan in Ukraine.

In a first, alleged ISIL-linked hacker extradited to U.S.

In a first, alleged ISIL-linked hacker extradited to U.S.

By

In what prosecutors are calling a "first of its kind" case, a hacker linked to the Islamic State of Iraq and the Levant (ISIL) has been extradited to the U.S. to face charges.

Data Privacy Day: Changes transform policy, perspective since last year

Data Privacy Day: Changes transform policy, perspective since last year

By

SCMagazine.com asked key thought leaders to identify key events in last year that have reshaped public policy and expectations of what happens—and what should happen—to personally identifiable information when users go online.

White House establishes new office to secure OPM background checks

White House establishes new office to secure OPM background checks

By

The White House will establish a new office, managed by the DoD, that will secure OPM background checks.

Israel's Electric Authority hit by massive cyberattack

Israel's Electric Authority hit by massive cyberattack

By

The Israeli Electric Authority was hit by a massive cyberattack during a period of record-breaking power consumption.

Opponents to Swiss surveillance law force direct public vote

Opponents to Swiss surveillance law force direct public vote

By

A Swiss digital surveillance law that has rankled online privacy advocates will now subjected to a public vote, after opponents collected enough signatures to challenge the legislation.

Lawsuit dismissed in Georgia after state admits to massive breach

Lawsuit dismissed in Georgia after state admits to massive breach

By

Plaintiffs in Atlanta had a class-action lawsuit dismissed on Monday following the state's acknowledgement it had put at risk the data of more than six million registered voters.

Lucrative pay offered India hackers to work for ISIS

Lucrative pay offered India hackers to work for ISIS

By

Hackers in India are being handsomely rewarded for taking on work for ISIS.

Maryland AG claims warrantless stingray use didn't violate suspect's rights

Maryland AG claims warrantless stingray use didn't violate suspect's rights

By

The Maryland Attorney General argued on appeal of a lower court ruling that the warrantless use of a stingray did not violate a suspect's Fourth Amendment right.

Advocacy groups call for repeal Cybersecurity Act of 2015

Advocacy groups call for repeal Cybersecurity Act of 2015

By

A coalition including the ACLU, FreedomWorks, and other digital privacy advocacy groups sent a letter to members of the House urging them to repeal the Cybersecurity Act of 2015.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US