Government requests for user data from Yahoo were up slightly over the first six months of 2015.
Browsing Category: Government
As China president Xi Jinping visits the U.S., a new report surfaces tying cyberespionage activities against U.S. interests in the South China Sea to China’s PLA Unit 78020.
It turns out roughly 5.6 million individuals may have had their fingerprints stolen as part of this year’s mammoth Office of Personnel Management breach – a figure five times what the agency initially announced back in June.
With many government departments still reeling when it comes to security, several federal CISOs brought up a handful of new ideas at last week’s Billington Cybersecurity Summit in Washington, D.C to combat future hacks.
Ransomware has emerged as major threat to consumers and businesses in recent years, and law enforcement agencies and security researchers have taken note. Authorities last year disrupted the Cryptolocker ransomware operation and now Dutch police have arrested two young men they believe are involved in the CoinVault ransomware. The arrests came Monday in the Netherlands[…]
Researchers with a DARPA-led team are looking into new ways to combat reverse engineering by using obfuscation to tidy up shoddy commercial and government security.
The Tor Project recently started a program to help libraries install Tor relays as a way to protect the privacy of patrons and other Internet users. The program didn’t get too far, however, as the first library to install a relay had to turn it off after town police officials were contacted by Department of Homeland[…]
A panel discussion at the Security of Things Forum debated the need for regulation to ensure the security and privacy of connected devices.
About a decade ago, many large software makers learned some very difficult lessons about software security and building security into their products from the start. Some are still learning. The FTC and a variety of security experts are hoping that today’s crop of start-ups will not have to go through that same painful process. The FTC[…]
The iMessage system, like much of what Apple does, is mostly a black box. The company doesn’t talk much about how the system works, and although some security researchers found a couple years ago that Apple could read users’ encrypted messages if they so choose, law enforcement has had no luck in getting Apple to open[…]