F-Secure analyzed 19 new families of mobile malware. It found a big increase in products that target Android.
The National Institute of Standards and Technology is making it easier for agencies to test the use of logical access control for applications.
Auditors found no security weaknesses that present an immediate threat to the jobs portal or user information housed in its database. The test represented the site's first independent security evaluation since OPM took control over USAJobs.gov from Monster Government Solutions in Oct. 2011. Under MGS management, hackers broke into the portal twice in 17 months.
Department says 99 percent of laptops now are encrypted. Of the 21 laptops reported stolen or missing in the last two months, all were secured with security software.
On this week's Bloomberg Government Capital Impact show, analysts will discuss which cybersecurity companies are being targeted for mergers and acquisitions. Plus, what's next in the internet tax debate and how are companies benefiting from the R&D tax credit. August 2, 2012
The Social Security numbers and bank routing numbers of about 8,000 accounts were exposed in a cyber breach of an Environmental Protection Agency database.
A battle over the role companies should play in keeping the U.S. safe from cyber attacks threatens to kill cybersecurity legislation in the Senate
The contract includes "very stringent" IT security requirements. The announcement follows a data breach that affected 123,000 TSP participants in 2011.
The White House is updating its 2010 trade secret theft and counterfeit product prevention strategy. The new plan will incorporate public input, which the administration is currently soliciting from stakeholders.
NSA director Gen. Keith Alexander gave the keynote at this year's Defcon in Las Vegas.
Two years after U.S. Cyber Command became operational, the military services that provide its cyber forces are beginning to more tightly define their respective responsibilities in the joint cyber environment. Gen. Keith Alexander issued a memo recently giving each of the services a lead cyber role for specific geographic areas of the world.
Hits on infrastructure such as electricity grids and water supplies increased 17-fold between 2009 and 2011.
The Veterans Affairs Department will award a $5 billion IT hardware contract in the next two months. GSA will release a request for information for cybersecurity tools in the coming days. Both are examples of a healthy and busy fourth quarter for acquisition.
The National Protection and Programs Directorate said it would not put a contractor communication guidance in place that would have required agency leaders to answer 15 questions before meeting with companies. Industry experts said the draft guidance would have had a chilling effect on agency-contractor communication.
A government cyber initiative has funded a project to scan smart phones. The Defense Advanced Research Projects Agency or DARPA paid for start-up Duo Security to develop an app to scan smart phones for vulnerable…