Recent successful legal action against the Waledac botnet offers some hope that lawyers might succeed where technology has failed in the war against cyber crime.
Traffic data shows that government briefings and other activities could be driving traffic to the controversial WikiLeaks site that leaked documents about the war in Afghanistan.
Contrary to some reports, malware did not cause the 2008 Spanair crash that killed 154 people. But an infected computer could have contributed to failures in the airline maintenance system that might have helped prevent the crash.
NSA appears to be suffering from a case of mission creep as it extends its reach from the .mil Internet domain into critical infrastructure that traditionally has been outside the military’s direct control.
A couple of old-line security pros warn that cybersecurity jobs – especially in government – are likely to be frustrating for qualified hackers. But there also are some upsides to the work.
The Cyber Command is charged with conducting and defending against cyber warfare, but we don’t really know what we’re doing yet in cyberspace, says former CIA director Gen. Michael Hayden.
Former CIA director Michael Hayden says the recent posting of classified material about the war in Afghanistan exposes the risks of information sharing among intelligence agencies. But the government’s use of IT could be a bigger threat to personal privacy.
A year after the launching the U.S. Cyber Challenge, three universities are wrapping up the first series of security boot camps aimed at recruiting college students into the ranks of security professionals.
Cybersecurity is a growth industry, and the first-of-their-kind degree programs at the University of Maryland are attracting hundreds of applicants.
The cooperation of government and the private sector is necessary for security in cyberspace, but it might not be feasible without some regulatory muscle.
The availability of DNSSEC signed root zone for the Internet is a critical step toward creating a more secure information infrastructure.
Spammers apparently abhor a vacuum, and as soon as one network of spambots is shut down, the volume produced by surviving networks expands to fill the void.
Hardware and software tools for securing new technologies can be easy to develop. But effective policy is what drives security.
The intelligence community’s Intellipedia is gaining acceptance with analysts and advisers, as a growing catalog of acronyms shows, although not to you.
A grass-roots reform of federal IT security practices is under way that has nothing to do with legislation, says the director of NIST's FISMA implementation program.