The White House announced the creation of E-Gov Cyber, a unit within OMB, that would oversee federal policy development and enforcement of those mandates.
Browsing Category: Government
In the years since Edward Snowden began putting much of the NSA‘s business in the street, including its reliance on the secret FISA court and National security Letters, warrant canaries have emerged as a key method for ISPs, telecoms and other technology providers to let the public know whether they have received any secret orders. But[…]
A cyberespionage campaign pulled off by pro-Syrian hackers against Assad opposition fighters used social engineering to steal military planning documents.
The U.S. Army has released to open source an internal forensics analysis framework that the Army Research Lab has been using for some time. The framework, known as Dshell, is a Python tool that runs on Linux and its designed to help analysts investigate compromises within their environments. The goal in open sourcing the framework[…]
Reddit published its first transparency report and said it received a relatively low number of government requests for user information and content takedowns.
Microsoft publishes a framework and guidelines on how to effectively set up and operate threat information sharing exchanges in hopes that organizations will actually share data.
In the wake of a recent enforcement action against Marriott for blocking guests’ WiFi hotspots in their hotels, the FCC is warning other hotel operators and business owners that such blocking is illegal and the commission’s Enforcement Bureau is taking note. Marriott last year paid a fine of $600,000 to settle an FCC enforcement action[…]
Business email compromise scams trick corporate executives, employees and clients into transferring business funds to criminal bank accounts in China.
The U.S. House of Representatives Subcommittee on Commerce, Manufacturing and Trade today held preliminary hearings on drafting federal data breach notification legislation.
Kaspersky Lab has found shared code and functionality between the Regin malware platform and a keylogger described in recently disclosed Snowden documents.