government
Point-and-shoot weapon stops drones without destroying them
Unmanned aerial vehicles – so-called drones – can be helpful, malicious, or simply disruptive, depending on the intentions of those who use them.But while regular …
UK, US law enforcement agencies disrupt Dridex botnet
The UK’s National Crime Agency is spearheading an onslaught against the Dridex (aka Bugat, aka Cridex) banking malware and the criminals that wield it.“Dridex …
The countdown to the EU Data Protection Regulation
The scope of the changes under the proposed shift to a single EU Data Protection Regulation, means that organisations should be doing the groundwork now to ensure they’re not …
Cybersecurity expectations: Myth and reality
Millennials in the U.S. and U.K. have almost entirely lost trust in government and business to protect their personal information online, according to Intercede.The number of …
Chinese hackers arrested at US request
Late last month, China’s president Xi Jinping made a state visit to the US and it resulted, among other things, in an agreement that the US and China will provide each …
Former journalist faces 25 years in prison for article defacement
Matthew Keys, a former Reuters social media editor, has been found guilty of computer hacking, and could be sentenced to spend as many as 25 years in prison.Keys was indicted …
The number of fingerprints stolen in OPM hack rose to 5.6 million
Once again, the scope of the breach at the US Office of Personnel Management has been amended: OPM’s press secretary Sam Schumach announced on Wednesday that “of …
NIST will award $3.6 million to projects designed to improve cybersecurity
The U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) will award $3.6 million for three pilot projects designed to make online …
Will the 2016 US presidential campaign get hacked?
As the 2016 presidential race heats up, Wakefield Research examined American perceptions of the threat of political hacking, and which of the leading U.S. presidential …
63% in favor of encryption backdoors to respond to national security threats
Vormetric did a survey on how Americans view “backdoor” access by government entities to the encrypted data of private businesses. Ninety-one percent recognized …
Risky mobile behaviors are prevalent in the government
Mobile devices are extremely prevalent in federal agencies, even within those that purport to have policies prohibiting the use of them. Lookout analyzed 20 federal agencies …
Pentagon’s unclassified email system breached, Russian hackers blamed
Pentagon’s Joint Staff unclassified email system, used by 4,000 military and civilian personnel, has been compromised by attackers, and it has been taken offline until …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025