The Office of Personnel Management faces a House subcommittee today to answer questions about its handling of the USAJobs relaunch.
Billions being paid to beef up smart grid to make sure its cyber-secure.
David Johnson, a senior analyst at Forrester, has been looking at what managers need to do to integrate Apples into their agency\'s network.
The spyware was designed to steal your information, and open the network for even worse cyber attacks.
The Lockheed Martin NextGen Cyber Innovation and Technology Center is already under construction. It is expected to open in March and will house 200 employees. The system will run three private clouds and one public cloud.
Sen. Tom Coburn (R-Okla.), who is also a medical doctor, said electronic health records could be a powerful magnet for cyber criminals, NextGov reports.
Topping the annual list is malware targeting Android-powered mobile devices and Apple computes.
The new leader of the Air Force\'s major information technology acquisition command said the service still is operating in a mode that lets individual programs design and build their own IT infrastructure.
NASA and the Internal Revenue Service were among the victims of a crew of Internet bandits who devised an international scheme to hijack more than 4 million computers to generate at least $14 million in fraudulent advertising revenue, federal prosecutors said Wednesday.
This virus is installing itself thorough a vulnerability in handling of TrueType fonts.
Two senior senators will introduce an amendment to the DoD authorization bill to increase the oversight over the IT supply chain. A preliminary report from GAO finds counterfeit technology parts easily making their way into weapons systems.
America\'s critical computer networks are so vulnerable to attack, it should act as a deterrent to war, U.S. cybersecurity expert, Richard Clarke said, according to the Associated Press.
A growing number of cyber criminals are targeting Android, iPhone and BlackBerry smartphones through apps. Even reputable apps have Trojan copies — which criminals can use to take over a phone, according to ProductReviews.net.
Panda Labs researchers say the Trojan virus accounts for three out of every four new virus strains created last quarter.
After computer tapes containing the health records of nearly 5 million military clinic patients were stolen from a contractor\'s car, TRICARE has directed the contractor, SAIC, to provide one year of credit monitoring for those who may have been affected by the breach.