- Welcome Guest
- Sign In
The U.S. government's objectives for improving cybersecurity are taking shape in updated contracting procedures, contracts and projected increases in spending. Several recent developments have underscored the federal commitment to bolstering the protection of IT resources. On the contracting front, ...
Microsoft on Thursday filed suit against the U.S. Department of Justice challenging the gag orders that accompany requests to access customers' private emails and other data. The orders prevent the company from notifying affected customers about the government's demands. The case is the fourth publi...
The FBI paid hackers to break onto the iPhone of the San Bernardino shooter, according to a Tuesday news report. The bureau obtained the services of gray hats, insiders said, and apparently did not get help from Cellebrite, as earlier reports had suggested. Gray hats are hackers who sell flaws to g...
Adobe last week issued an emergency security patch to fix a vulnerability in Flash that could leave users vulnerable to a ransomware attack. The vulnerability exists in Adobe Flash Player 21.0.0.197 and earlier versions for Windows, Macintosh, Linux and Chrome operating systems. It can cause a crash...
Facebook has served as an online marketplace for armed militias in Libya and other war-torn countries, according to a news report published Wednesday. An array of light weapons bought and sold after the fall of Moammar Gadhafi unleashed a torrent of unregulated commerce in Libya, which previously ha...
The U.S. government is picking up the pace in its efforts to use open source software as much as possible. Federal CIO Tony Scott last month released details of a proposed policy designed to allow customized software created for one agency to be openly available to other agencies as well. Industry a...
Lawyers for Apple on Tuesday argued in a federal District Court filing that the founding fathers would be appalled by the demands the Department of Justice has made in seeking a backdoor to iPhone encryption. The FBI and DoJ want Apple to create new software code that would help investigators bypass...
The legal battle between Apple and the Department of Justice over access to encrypted iPhone data got a little more personal last week after lawyers for Apple blasted a government filing that accused the company of collaborating with the Chinese government. The DOJ's filing was nothing more than a s...
Lawmakers this week sent to the White House the draft version of a bill that would penalize technology companies if they failed to cooperate on encryption cases, according to Capitol Hill sources. The bill, sponsored by Senate Intelligence Committee Chairman Richard Burr, R-N.C., and ranking member ...
The Obama administration is seeking $3.1 billion for a fund to update federal IT resources that need to be replaced with more efficient systems. The fund would bolster the government's annual spending on IT, which is set for a modest increase to $89.8 billion in the administration's fiscal 2017 budg...
Security researchers at Palo Alto Networks last week announced that they had found the first ransomware in the wild aimed at Macintosh computers, but Apple and one of its developers quickly neutered it. The ransomware was embedded in software for installing an OS X app for sharing files on BitTorren...
There are two sides to every coin -- a good side and a bad side. One side helps you and the other side hurts you. The Internet is a great example: The good side lets you learn anything, about anything, anytime, any place. The bad side targets you with scams. They are running rampant, and there is no...
Apple General Counsel Bruce Sewell on Tuesday testified before the House Judiciary Committee that his company should not be required write new code for software that would weaken the security of the iPhone in the wake of the San Bernardino, California, terrorist attacks. The FBI wants Apple to take ...
FBI Director James Comey on Tuesday testified before the House Judiciary Committee that the government has the legal right to gain limited access to the iPhone of one of the San Bernardino, California, shooters and other suspected terrorists. Congress and the courts can create a mechanism to protect...
Social Media
See all Social Media