A bill in the New York legislature would eliminate anonymous comments posted online. Aside from First Amendment concerns for the general public, what would such a law mean to government employees?
PCs are still the biggest target for cyber criminals, and legitimate but small-time, seldom-updated websites are becoming a common vector, McAfee’s threat report says.
Imperva's reconstruction of the MilitarySingles hack shows the inherent risks of user-generated content and asks if government needs a "higher standard" for social networking.
The new Joint Cyber Center includes members from the intelligence, operations, and command and control divisions, and a team from the U.S. Cyber Command.
Applicants have an eight-day window to review and finalize applications for new generic top-level domain names.
The hacker collective says it has made data taken from the Bureau of Justice Statistics available for public download as part of its ongoing anti-government campaign.
A Carnegie Mellon study shows that energy companies and utilities lag behind the more highly regulated financial services industry in cybersecurity and privacy protection.
Cyber criminals took people for $485 million in 2011 through a variety of scams, the Internet Crime Complaint Center reports. Here are common tactics to watch out for.
The continued presence -- and exploitation -- of known vulnerabilities suggests that some executives have decided that installing software patches is not worth the effort.
Fresno, Calif., automates the task of tracking and controlling its network endpoints, both stationary and mobile.
Families of Android malware quadrupled in the past year, while the files used to distribute the malware skyrocketed from 139 to 3,063, according to a report from F-Secure.
A major vendor of energy system control and smart metering systems is adopting Microsoft's Security Development Lifecycle to help ensure better security.
Agilance's Federal Risk and Authorization Management Program Content Pack includes the baseline security controls required of cloud service providers.
NIST's streamlined guidance on risk management focuses on a set of key recommendations for ensuring the security and reliability of information and communications systems.
Mobile devices are ideal for many medical uses, but they also can put patient records, and sometimes even patients themselves, at risk, according to a DHS report.