Sophos has identified a Trojan horse masquerading as a Android version of the game on some unofficial apps stores.
Throughout government, security officers will have different interpretations of what security controls are acceptable, says GSA's Dave McClure.
DHS and the U.S. Navy are interested in extracting data from video game consoles purchased overseas, in order to catch terrorists and pedophiles.
Changes proposed by the National Institute of Standards and Technology would clarify the transition to a new set of approved tools and correct some errors in the current version.
An Iranian dissident working for Israel used a memory stick to implant the Stuxnet worm at Iran's Natanz nuclear processing facility, according to a published report.
It has taken months, but fixes for the most prolific malware to hit the Apple OS have arrived, and the infection rate for Flashback is dropping.
The greatest international threat today is not to military targets or critical infrastructure but to intellectual property, said Estonian President Toomas Hendrick Ilves.
Even if you check the URLs for links in e-mail and other messages, you could still be fooled by homographs.
A team at Oak Ridge National Lab is developing tools that use advanced machine learning to counter cyber threats.
A cyber exercise at Los Alamos National Laboratory is helping to lay the mission foundations and priorities for a new federal cyber coordination center.
State IT and health officials say 280,000 of the victims had their Social Security numbers stolen in the medical-records hack, which came from Eastern Europe.
The 10 teams competing in the National Collegiate Cyber Defense Competition this month are, in their own way, helping to develop a much-needed cybersecurity workforce.
The PROTECT Initiative will use a database of phone and tablet serial numbers to render lost or stolen devices inactive and educate the public on protective steps.
CAC and PIV cards will move to smart phones in 2012, creating a new model for access control, according to observers' predictions.
The country's "national information network," set to be completed in 2013, would track users' actions and keep out any content the government deems offensive.