government
Will the DHS receive authority over private sector networks?
A bill that would give the U.S. Department of Homeland Security the power to impose federal cybersecurity standards on private sector companies whose flawless functioning is …
Whitehat hacker’s laptop, cellphones seized and searched
The well-known whitehat hacker and security researcher that goes by the handle Moxie Marlinspike has recently experienced firsthand the electronical device search that …
Two FBI fugitives wanted on federal cyber crime charges captured
On November 3, 2010, Dorin Codreanu and Lilian Adam were arrested in Portage, Wisconsin by FBI agents. Codreanu and Adam have been fugitives since September 30 when FBI agents …
Myanmar cut off the Internet ahead of elections
The Southeast Asian country of Myanmar (formerly known as Burma) has been practically cut off the Internet as an extensive DDoS attack that started in late October has …
Experts run large cyber attack simulation exercise
Europe’s cyber security experts are testing their responses today in the first ever pan-European cyber-attack simulation exercise. In “Cyber Europe 2010“, …
Obama Administration gets a “B” for cybersecurity
The Electronic Privacy Information Center released its annual Privacy Report Card for the Obama Administration and – when compared to last year’s results – …
Sensitive prisoner data found discarded in dumpster
When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …
Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
Government agents following suspects on social networks
The issue of whether or not government or law enforcement agents are or should be allowed to go “undercover” on social networks is not a new one, but thanks to the …
Featured news
Resources
Don't miss
- Building cybersecurity culture in science-driven organizations
- How Kim Crawley challenges big tech in “Digital Safety in a Dangerous World”
- Google strengthens secure enterprise access from BYOD Android devices
- Southwest Airlines CISO on tackling cyber risks in the aviation industry
- Insider risk management needs a human strategy