Cybersecurity

Hackers Successfully Baited Foreign Diplomats With Nude Carla Bruni Pics

China is likely behind the attacks, researchers say.

Cybersecurity

L.A. Gay & Lesbian Center clients hit up for money

Financial Services // Healthcare and Public Health // California, United States

Cybersecurity

Chinese pry open European networks with Syria tease

Government (Foreign) // Europe

Cybersecurity

Eight Tech Giants Urge Obama and Congress to Curb NSA

Open letter says electronic surveillance needs to be restricted by law.

Cybersecurity

Leading tech firms seek stronger surveillance rules

Open letter urges Congress and the president to ensure U.S. surveillance efforts are "restricted by law, proportionate to the risks, transparent and subject to independent oversight."

Cybersecurity

Data on 465,000 tax refund and benefits debit cardholders hacked

Financial Services // Government (U.S.)

Cybersecurity

Web traffic from U.S., Germany, South Korea and Iran intercepted by Iceland?

Government (U.S.) // Government (Foreign) // U.S., Germany, South Korea and Iran

Cybersecurity

DARPA Plugs Contest for Watson-like System to Deflect Hackers

Cyber Grand Challenge winners will take home $2 million to create an unmanned hacker-stopper.

Cybersecurity

Pentagon exploring methods to mitigate insider threats

The Defense Department wants contractors to offer up ideas on combatting espionage, sabotage, treason and terrorism.

Cybersecurity

Hackers Accidentally Auction Secrets, Ruin Relationships and Game Investors

Just another week in ThreatWatch, our regularly updated index of noteworthy data breaches.

Cybersecurity

Congress still awaiting IT security answers from VA

Hill sources say the House Veterans' Affairs Committee has received only a single response to its multitude of inquiries.

Cybersecurity

DARPA gears up for Cyber Grand Challenge

The challenge is a chess-like competition that pits teams of researchers against each other in a contest to develop unmanned cybersecurity systems.

Cybersecurity

Looking beyond the cyber framework

With final comments on the NIST plan due Dec. 13, industry and agency experts are contemplating what comes next.

Cybersecurity

Is Cyber Command ready to stand on its own?

Alexander's planned retirement offers a chance to reorganize, but the changes required are anything but simple.

Cybersecurity

Cyber Arms Dealers Peddle 85 Worms a Day

Details on secret flaws in Microsoft and other software, plus the tools to exploit them, now sold to the highest bidder.

Cybersecurity

Lab seeks partners for Network Mapping System

Better mapping can give more detailed information to IT managers tasked with protecting networks.

Cybersecurity

NSA Connection Creates Credibility Problems for NIST Encryption Standards

New Commerce secretary discusses need to 'restore trust.'

Cybersecurity

IG dings DHS on internal cybersecurity

A Republican critic claims gaps in the department's defenses "would be obvious to a 13-year-old with a laptop."

Modernization

Pentagon Disconnects iPhone, Android Security Service, Forcing a Return to BlackBerry for Some

The Defense Department's new mobile device management system isn’t yet ready to protect Apple or Android smartphones and tablets.