Cybersecurity
Iranian hackers leak Turkmenistan web address registry passwords
Technology // Web Services // Turkmenistan; UK
Cybersecurity
Commentary: Head count isn’t the answer for cyber defense
Risk-based systems, not more people, are needed to tackle the data security challenge.
Digital Government
The government is still trying to spy on a lot of your Twitter and Google data
80 percent of the U.S. government's asks on user data came without a warrant.
Modernization
ICE gives thousands of employees <span>i</span>Phones for work and play
Agency began distributing secured government-owned Apple devices after discontinuing a BlackBerry contract.
Cybersecurity
Child patients become victims of laptop theft
Healthcare and Public Health // California, United States
Cybersecurity
Cyber stakeout at Illinois nursing home yields $170,000
Financial Services // Healthcare and Public Health // Illinois, United States
Cybersecurity
No, Anonymous doesn't have access to U.S. warheads
The group does allege to have sensitive information about the Justice Department.
Cybersecurity
FBI to start querying national iris index this year
The bureau’s $1 billion biometric rolodex for tracking criminals is 65 percent complete.
Cybersecurity
Cyber Command’s growth plan raises a lot of questions
For starters, where will the military find enough skilled computer experts?
Cybersecurity
Anonymous holds U.S. judicial files ransom until hacking rules change
Government (U.S.) // United States
Cybersecurity
Inside the eastern European cybercrime network that brought down NASA
Federal authorities charged three men with building and disseminating a virus that crippled NASA computers.
Cybersecurity
Title: East Europeans ransack NASA, U.S. computers with bank password-stealing virus;
Government (U.S.), Financial Services // U.S., Europe
Modernization
Congressional commission to look closer at China cloud computing
Group plans study on security risks of Chinese cloud.
Cybersecurity
What the future without passwords could look like
The brains at Google are experimenting with new authentication technologies.
Cybersecurity