government
Governments unprepared for the impact of the big five IT trends
A new MeriTalk study, underwritten by Brocade, examines how the implementation of the Big Five – data center consolidation, mobility, security, big data, and cloud …
The FBI is looking for a “malware provider”
In a request for quote (RFQ) published on Monday, the Bureau has explained the reason behind their need: The Operational Technology Division (OTD), Investigative Analysis Unit …
What do government security pros think?
Tripwire and the Government Technology Research Alliance (GTRA) announced the results of a U.S. government cybersecurity survey that evaluated the attitudes and responses of …
How Edward Snowden’s actions impacted defense contractors
A new ThreatTrack Security study sheds light on the attitudes of a very exclusive group of IT and security managers – those employed by U.S. defense contractors – …
GCHQ DoSed Anonymous’ IRC server
British spy agency GCHQ has used Denial of Service attacks against Anonymous, in order to disrupt their communications, their activities, and to lead members of the loosely …
Hackers sue German government for helping NSA spy on its citizens
The Chaos Computer Club (CCC), Europe’s largest hacker association, and the International League for Human Rights (ILMR) are suing the German government for allegedly …
Canadian spy agency used free airport WiFi to track travelers
A new report based on documents provided by NSA whistleblower Edward Snowden will make Canadians question whether the country’s electronic spy agency does, as it claims, …
SpyEye creator pleads guilty
Aleksandr Andreevich Panin, a Russian national also known as “Gribodemon” and “Harderman,” has pleaded guilty to conspiracy to commit wire and bank …
Consumers care more about business data collection than government surveillance
TRUSTe released its latest U.S. Consumer Confidence Index, which shows that a high proportion of U.S. adults aged 18 and older are worried about their privacy online, online …
Feds cloned TorMail server with future investigations in mind
TorMail users engaged in illegal activities might have felt more than a twinge of anxiety when it was confirmed last summer that the FBI took control of Freedom …
Feds take over online counterfeit card webshop, arrest its operators
Three men who allegedly ran a one-stop online shop selling counterfeit credit cards and holographic overlays to be used by criminals to make fake identifications, face federal …
Motivation and techniques of world’s most sophisticated cyber attackers
CrowdStrike released “CrowdStrike Global Threats Report: 2013 Year in Review,” the product of its year-long study of more than 50 groups of cyber threat actors. …
Featured news
Resources
Don't miss
- F5 data breach: “Nation-state attackers” stole BIG-IP source code, vulnerability info
- Microsoft patches three zero-days actively exploited by attackers
- U.S. seizes $15 billion in Bitcoin linked to massive forced-labor crypto scam
- A safer way to break industrial systems (on purpose)
- Maltrail: Open-source malicious traffic detection system