Cybersecurity

Hacker compromises Google, Yahoo secure site credentials

Government (U.S.) // Web Services // New Delhi, India

Cybersecurity

10,000 guests at Houston luxury retreat exposed to ID theft

Hospitality // Texas, United States

Cybersecurity

Chinese-Made Inventory Scanners Allow Hackers to Track Shipments

Malware traced to China was found on tools at seven shipping and logistics firms.

Cybersecurity

Plastic surgeon provided a woman’s before-and-after photos to a TV station

Healthcare and Public Health // Utah, United States

Cybersecurity

Terrorist tweets, spectrum modeling, gun tracking and video conferencing

News and notes from around the federal IT community.

Cybersecurity

No thawing of cyber tensions on Kerry’s Beijing trip

A "frank exchange" of views between the U.S. and China yielded no concrete results on the cyber-attack front.

Modernization

Beijing Thinks the <span>i</span>Phone is a Threat to China’s National Security

The phone's Frequent Locations function, which tracks the exact places you have been and the amount of time you spent there, is capturing "extremely sensitive data," says Chinese government TV.

Cybersecurity

Hackers track where shipments go with tainted inventory scanners

Manufacturing // Other Critical Infrastructure // United States

Cybersecurity

OPM breach, de facto debarment, system on a chip and more

News and notes from around the federal IT community.

Modernization

Android's Factory Reset Doesn't Delete Everything. Here's How to Really Wipe Your Data

Security firm Avast purchased twenty used Android phones on eBay. Through extraction methods, they were able to recover old emails, texts, and even photos.

Cybersecurity

97 Percent of Key Industries Doubt Security Compliance Can Defy Hackers

Utilities and energy companies are more focused on preventing downtime than thwarting breaches.

Digital Government

Why It Costs $1.7 Billion to Computerize Immigration Forms

USCIS awards new contract to turn around long-delayed digital casework system.

Cybersecurity

Isolate and conquer: Getting past a reliance on layered security

It's time to throw cyberattackers into solitary before they strike, writes Bromium's Simon Crosby.

Cybersecurity

Cyber information-sharing bill moves forward

The measure would set up a "portal" at DHS that private firms could use to confidentially share threat information without legal liability.

Cybersecurity

Biometric database, software inventory, smallpox and a prescreening milestone

News and notes from around the federal IT community.