Cybersecurity

Key Alabama government network breached

Government (U.S.) // Alabama, United States

Cybersecurity

Iranian hackers leak Turkmenistan web address registry passwords

Technology // Web Services // Turkmenistan; UK

Cybersecurity

Chinese attackers purloin NYT emails for months

Media // New York, United States

Cybersecurity

Commentary: Head count isn’t the answer for cyber defense

Risk-based systems, not more people, are needed to tackle the data security challenge.

Digital Government

The government is still trying to spy on a lot of your Twitter and Google data

80 percent of the U.S. government's asks on user data came without a warrant.

Modernization

ICE gives thousands of employees <span>i</span>Phones for work and play

Agency began distributing secured government-owned Apple devices after discontinuing a BlackBerry contract.

Cybersecurity

Child patients become victims of laptop theft

Healthcare and Public Health // California, United States

Cybersecurity

Cyber stakeout at Illinois nursing home yields $170,000

Financial Services // Healthcare and Public Health // Illinois, United States

Cybersecurity

No, Anonymous doesn't have access to U.S. warheads

The group does allege to have sensitive information about the Justice Department.

Cybersecurity

FBI to start querying national iris index this year

The bureau’s $1 billion biometric rolodex for tracking criminals is 65 percent complete.

Cybersecurity

Cyber Command’s growth plan raises a lot of questions

For starters, where will the military find enough skilled computer experts?

Cybersecurity

Inside the eastern European cybercrime network that brought down NASA

Federal authorities charged three men with building and disseminating a virus that crippled NASA computers.

Cybersecurity

Title: East Europeans ransack NASA, U.S. computers with bank password-stealing virus;

Government (U.S.), Financial Services // U.S., Europe

Cybersecurity

What the future without passwords could look like

The brains at Google are experimenting with new authentication technologies.

Cybersecurity

Data dump; Network intrusion; Software vulnerability

Manufacturing // Australia

Cybersecurity

Stolen device

Government (U.S.) // Florida, United States

Cybersecurity

DHS warns of password-cracker targeting industrial networks

Researchers publicized the hacking technique before alerting authorities or the manufacturer.