government
Malaysian hacker breached Federal Reserve and DoD contractor networks
When agents arrested Malasyian Lin Mun Poo on account of selling US$1,000 worth of stolen credit card numbers just hours after he arrived in the U.S., they probably …
Will the DHS receive authority over private sector networks?
A bill that would give the U.S. Department of Homeland Security the power to impose federal cybersecurity standards on private sector companies whose flawless functioning is …
Whitehat hacker’s laptop, cellphones seized and searched
The well-known whitehat hacker and security researcher that goes by the handle Moxie Marlinspike has recently experienced firsthand the electronical device search that …
Two FBI fugitives wanted on federal cyber crime charges captured
On November 3, 2010, Dorin Codreanu and Lilian Adam were arrested in Portage, Wisconsin by FBI agents. Codreanu and Adam have been fugitives since September 30 when FBI agents …
Myanmar cut off the Internet ahead of elections
The Southeast Asian country of Myanmar (formerly known as Burma) has been practically cut off the Internet as an extensive DDoS attack that started in late October has …
Experts run large cyber attack simulation exercise
Europe’s cyber security experts are testing their responses today in the first ever pan-European cyber-attack simulation exercise. In “Cyber Europe 2010“, …
Obama Administration gets a “B” for cybersecurity
The Electronic Privacy Information Center released its annual Privacy Report Card for the Obama Administration and – when compared to last year’s results – …
Sensitive prisoner data found discarded in dumpster
When a homeless couple went searching for recyclable things in a gas station dumpster in California last week, they probably didn’t expect to find files containing …
Pentagon to aid DHS in case of cyber attack on domestic soil
It is a well know fact that the U.S. Department of Defense is forbidden to deploy military units within the nation’s boarders for law enforcement purposes. The only …
Government agents following suspects on social networks
The issue of whether or not government or law enforcement agents are or should be allowed to go “undercover” on social networks is not a new one, but thanks to the …
Featured news
Resources
Don't miss
- GitHub CISO on security strategy and collaborating with the open-source community
- Chainsaw: Open-source tool for hunting through Windows forensic artefacts
- Time for a change: Elevating developers’ security skills
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance