U.S. police routinely track cell phones in their investigations, but only a tiny minority obtain warrants to do so, according to an ACLU investigation.
An administration official says that legislation is essential to effective protections in the proposed Consumer Privacy Bill of Rights.
The chances of Anonymous or anyone else shutting down the Internet are pretty slim, but even skeptical experts say damage can be done.
Sen. John McCain's recent rant about DHS could make even an airline passenger feel sorry for the department.
Officials stop short of calling for regulation of industry cybersecurity but tell a House panel that current efforts are "not working."
A band of hackers calling themselves "LulzSec Reborn" exposed the usernames and passwords of more than 170,000 subscribers to an online military dating service March 25. Or has it?
As social media analytics improves, the intelligence community and other agencies are monitoring the traffic on popular sites. But could they put privacy at risk?
The former CFO of the Key Largo Wastewater Treatment District faces 21 felony counts.
A Senate budget hearing on the Defense Department's Strategic and Cyber Commands became a duel over how the nation's cyber defense should be structured.
The four departments with national security responsibilities haven't identified the threats or developed mitigation policies and procedures, a report states.
The Army Cyber Command is changing its information assurance accreditation methods by increasing automation and training additional compliance teams.
The commission calls for greater regulation of data brokers and a Do-Not-Track option that could be made law if not adopted voluntarily.
The company's Digital Crimes Unit, with an assist from the U.S. Marshals Service, confiscates servers and IP addresses and files civil charges against 39 unknown defendants.
GSA guidelines don't carry the weight that mandates do with feds, and GAO believes that the rules for electronic waste disposal needs the backing of an agency with enforcement powers.
The take-down of an Internet fraud ring went down as planned, but inadequate public outreach left millions of computers at risk.