The new leader of the Air Force\'s major information technology acquisition command said the service still is operating in a mode that lets individual programs design and build their own IT infrastructure.
NASA and the Internal Revenue Service were among the victims of a crew of Internet bandits who devised an international scheme to hijack more than 4 million computers to generate at least $14 million in fraudulent advertising revenue, federal prosecutors said Wednesday.
This virus is installing itself thorough a vulnerability in handling of TrueType fonts.
Two senior senators will introduce an amendment to the DoD authorization bill to increase the oversight over the IT supply chain. A preliminary report from GAO finds counterfeit technology parts easily making their way into weapons systems.
America\'s critical computer networks are so vulnerable to attack, it should act as a deterrent to war, U.S. cybersecurity expert, Richard Clarke said, according to the Associated Press.
A growing number of cyber criminals are targeting Android, iPhone and BlackBerry smartphones through apps. Even reputable apps have Trojan copies — which criminals can use to take over a phone, according to ProductReviews.net.
Panda Labs researchers say the Trojan virus accounts for three out of every four new virus strains created last quarter.
After computer tapes containing the health records of nearly 5 million military clinic patients were stolen from a contractor\'s car, TRICARE has directed the contractor, SAIC, to provide one year of credit monitoring for those who may have been affected by the breach.
Israel\'s intelligence services, military spokesman and Interior Ministry are among the websites that are offline due to a broad technical malfunction.
Through a restraining order, five Coreflood botnet command and control servers were seized and swapped with government servers halting further damage to millions of computers.
The software can stop someone from uploading a secret document, pinpoint the location of the breach, and notify administrators.
U.S. intelligence officials have accused China and Russia of systematically stealing data for their own national economic gain. It is the most forceful and detailed public airing of U.S. allegations after years of private complaints, the Associated Press reports.
George Arnold of the National Institute of Standards and Technology talks about establishing a more efficient electric power system.
The Homeland Security Department and NASA moving to the cloud to support mission needs and reduce the cost and effort to support back-office systems. Federal Chief Information Officer Steven VanRoekel said he is focusing on four areas of cloud: agencies, procurement, international and cybersecurity.
The Department of Homeland Security wants to be your \"friend\" whether you invite them or not.