More Cybersecurity Articles
Symantec's annual internet threat report credited the U.S. government and social media companies with using a mix of intelligence, bot tracking and lessons learned from the 2016 election to identify and close thousands of accounts and pages believed to be associated with foreign influence campaigns.
The virtual system attracts potential cyber attackers with a supercharged honeypot that features an entire virtual environment and tricks them into sticking around.
Two national labs are investigating how quantum computing can help secure and sync communication among the nation’s electricity suppliers.
An initial forensic review determined that there is no evidence at this time to indicate any DNS records for federal domains were altered or manipulated.
The Defense Department must ensure that cloud-based data can be transferred across classification levels and accessed by only the right people, with the right authorization at the right times.
Public- and private-sector leaders are starting to think about stepping up their defensive activities, by taking more active measures, including "hacking back."
Some staff at the Federal Housing Finance Agency failed to follow the proper response protocols when subjected to a fake phishing attack, auditors say.
While legitimate fears about data vulnerability have limited agencies' attempts to share information, some are turning to new cryptographic techniques to protect privacy while data is processed.
The Cybersecurity and Infrastructure Security Agency is building a more permanent institutional capacity to tackle election security.
Weak passwords may be the result of the endowment effect, in which people ascribe more value to things they already have and are reluctant to make adjustments -– even when those changes may provide more benefit.
Sign up for our newsletter.