Government

Government news, analysis, research, how-to, opinion, and video.

data recovery
iran map

internet of things data

How 'smart cities' push IoT cybersecurity for state and local IT

The internet of things is at a much more mature place at the state and local level than it is in the federal government or even private industry. It’s a balancing act, clearly, between government leaders working to implement IoT...

img 20170512 173142 01

The WannaCry ransomware might have a link to North Korea

As security researchers investigate last Friday’s massive attack from the WannaCry ransomware, they’ve noticed clues that may link it with a North Korean hacking group that has been blamed for attacking banks across the world.

nsa aerial

Microsoft blames US stockpiled vulnerability for ransomware attack

Microsoft on Sunday said a software vulnerability stolen from the U.S. National Security Agency has affected customers around the world, and described the spread of the WannaCrypt ransomware on Friday in many countries as yet another...

1 ceo target threat

Did Kaspersky step in dog-doo?

How did Kaspersky find themselves in the cross hairs of the US intelligence community

trump sign immigration eo

Mixed reviews for Trump’s Executive Order on cybersecurity

Experts generally agree that President Trump’s cybersecurity Executive Order is well intended and a good start. But several of them have specific suggestions on how it could be improved.

170511 trump

Trump pushes US government to the cloud with cybersecurity order

President Trump has finally signed a long-awaited executive order on cybersecurity, which calls for the U.S. government to move to the cloud and modernize its IT infrastructure.

emmanuel macron france

Newly elected French president raises questions in trying to dupe hackers

Emerging trend of cyber deception, revealed by Emmanuel Macron, may be a slippery slope.

AeroVironment Snipe Nano Quad drone
video

This mini drone can be a soldier's eyes

The lightweight drone can be easily deployed to scope out a potentially hostile environment without putting soldiers in danger.

john oliver

FCC hit with DDoS attacks after John Oliver takes on net neutrality

The FCC's website slowed to a crawl after comic and political commentator John Oliver urged viewers to flood the agency with comments in support of net neutrality, in what appeared to be a repeat of a 2014 incident. But the cause may...

u.s. customs and border protection crossing

US device searches at borders ignite resistance

In CBP's fiscal year 2015, the agency searched just 8,503 devices during 383.2 million border crossings. But in fiscal year 2016, the number of device searches jumped to 19,033, and in the first six months of FY2017, CBP searched...

trip packing luggage suitcase laptop

How to prevent your data from being searched at the US border

Travelers concerned about their privacy can take steps to protect their data as they cross the U.S. border. They should remember the old Boy Scout motto: Be prepared.

swiss federal intelligence service

Not all is sweet. Swiss intelligence infiltrates German tax authorities

German tax authorities have been bribing Swiss bank personnel to reveal bank data since 2006. In late-April a Swiss national operating on behalf of the Swiss Federal Intelligence Service was arrested in Frankfurt, and charged with...

beijing alley

China's spy hunting tactics

China’s counterintelligence capabilities continue to evolve. The newest arrow in their quiver to detect those who are breaking trust with Mother China is the “bounty” for identification of “suspicious foreigners.”

nsa aerial

NSA ends surveillance tactic that pulled in citizens' emails, texts

The U.S. National Security Agency will no longer sift through emails, texts and other internet communications from U.S. citizens that mention foreign targets under surveillance.

federal trade commission building ftc

Why we need the FTC to police ISP privacy practices

The move to scrap the FCC's rules for ISPs leaves the industry without any federal oversight and puts internet privacy at risk.

3147352

Trump's cybersecurity mystery: 90 days in, where's the plan?

On Jan. 6, Donald Trump said his administration would produce a report on cybersecurity within 90 days after his inaguration. On Wednesday, President Trump marks his 90th day in office with no sign of a report or indication that one...

Hacker in silouhette at laptop

Cybercrime diaries: All the hacks and data breaches in one place

The cybercrime diaries are a series of blogs that provide CIOs, CSOs, CISOs and IT security teams with bulleted datelines and high-level summary commentary on the most noteworthy cybercriminal activity in a quarterly period.

img 20170412 103417

Microsoft Word exploit linked to cyberspying in Ukraine conflict

A severe Microsoft Office vulnerability was recently used to deliver spyware to Russian-speaking targets, in a possible case of cyberespionage.

Load More