Government // Cybersecurity
News & Commentary
Ramnit Botnet Disrupted By International Public-Private Collaboration
Sara Peters, Senior Editor at Dark Reading
News
Europol leads the effort to bring down the bank credential-stealing botnet that infected 3.2 million computers across the globe.
By Sara Peters Senior Editor at Dark Reading, 2/25/2015
Comment0 comments  |  Read  |  Post a Comment
Gemalto: NSA, GCHQ May Have Been Behind Breaches It Suffered In 2010 And 2011
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
But the 'sophisticated' attacks hit only Gemalto office networks--not 'massive theft' of SIM crypto keys, vendor says, and such an attack, if waged, would only affect 2G networks, not 3G or 4G.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/25/2015
Comment3 comments  |  Read  |  Post a Comment
Russian Hacker Who Hit Heartland, NASDAQ, Extradited To US
Sara Peters, Senior Editor at Dark Reading
News
Vladimir Drinkman, cohort of Albert Gonzalez, appears before US federal court after arrest and extradition by Dutch authorities.
By Sara Peters Senior Editor at Dark Reading, 2/18/2015
Comment2 comments  |  Read  |  Post a Comment
Why Kasperskyís Bank Robbery Report Should Scare Us All
Susan Nunziata, Community Editor
Commentary
So, you don't work for a financial institution? Don't think you're off the hook for the kind of theft discussed by Kaspersky. Banks are certainly not the only organizations moving around massive amounts of money every day.
By Susan Nunziata Community Editor, 2/18/2015
Comment23 comments  |  Read  |  Post a Comment
Android To Become 'Workhorse' Of Cybercrime
Junko Yoshida,
Commentary
Android and Windows laptops dead even in infection rates for the year 2014.
By Junko Yoshida , 2/16/2015
Comment1 Comment  |  Read  |  Post a Comment
Obama, Tim Cook, Others Debate Sharing Cyber Security Data
Thomas Claburn, Editor-at-Large
News
The Obama White House wants more effective sharing of cyber security data between the public and private sectors. Despite some snubs, Apple's Tim Cook spoke at a special summit on the issue.
By Thomas Claburn Editor-at-Large, 2/14/2015
Comment6 comments  |  Read  |  Post a Comment
Anthem Hack: Lessons For IT Leaders
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
There are two key lessons that IT can learn from the Anthem breach.
By Joe Stanganelli Attorney, Beacon Hill Law, 2/12/2015
Comment23 comments  |  Read  |  Post a Comment
Smart Cars Vulnerable To Security Hacks, Report Finds
Eric Zeman,
Commentary
A US senator's report finds that carmakers are leaving vehicles open to intrusive attacks that can steal personal data and take over controls.
By Eric Zeman , 2/9/2015
Comment9 comments  |  Read  |  Post a Comment
White House Revises Rules For Intelligence Gathering
Thomas Claburn, Editor-at-Large
News
Intelligence agencies like the NSA face data-retention limits and privacy training.
By Thomas Claburn Editor-at-Large, 2/3/2015
Comment3 comments  |  Read  |  Post a Comment
NSA Report: How To Defend Against Destructive Malware
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
In the wake of the Sony breach, spy agency's Information Assurance Directorate (IAD) arm provides best practices to mitigate damage of data annihilation attacks.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/22/2015
Comment3 comments  |  Read  |  Post a Comment
Enterprise Drones: What CIOs Should Know
Curtis Franklin Jr.,
Commentary
Flying drones are coming to the enterprise: Will CIOs and the FAA be ready?
By Curtis Franklin Jr. , 1/16/2015
Comment16 comments  |  Read  |  Post a Comment
In Wake Of Violence, France Reports Spike In Cyberattacks
Sara Peters, Senior Editor at Dark Reading
News
19,000 French websites have been attacked since Jan. 7.
By Sara Peters Senior Editor at Dark Reading, 1/15/2015
Comment8 comments  |  Read  |  Post a Comment
Obama Calls For 30-Day Breach Notification Policy For Hacked Companies
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
But chances of this becoming a mandatory national breach notification law are no sure thing, even in the wake of the past year's high-profile hacks, experts say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 1/12/2015
Comment12 comments  |  Read  |  Post a Comment
InformationWeek 2014 Strategic Security Survey
InformationWeek Staff,
News
Managing the complexity of security is the top concern for enterprise IT teams. Look for a new era of more sophisticated data analysis in the coming year.
By InformationWeek Staff , 1/9/2015
Comment1 Comment  |  Read  |  Post a Comment
FBI Director Says 'Sloppy' North Korean Hackers Gave Themselves Away
Sara Peters, Senior Editor at Dark Reading
News
Bureau chief says hackers occasionally forgot to use proxy servers, while the Director of National Intelligence says North Koreans have no sense of humor.
By Sara Peters Senior Editor at Dark Reading, 1/7/2015
Comment17 comments  |  Read  |  Post a Comment
Privacy By Design: Protect User Data From 'Get-Go'
Henry Kenyon,
News
International effort seeks to bake in consumer privacy options.
By Henry Kenyon , 1/5/2015
Comment0 comments  |  Read  |  Post a Comment
Sony Hacked By N. Korea, Hacktivists, Ex-Employee, Or All Of The Above?
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
FBI gets briefed on ex-Sony employee's possible role in hack as questions remain about who did what and when in epic breach of the entertainment company.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/30/2014
Comment21 comments  |  Read  |  Post a Comment
Sony Cancels Movie, US Confirms North Korea Involvement, But Were Bomb Threats Empty?
Sara Peters, Senior Editor at Dark Reading
News
After the Sony hackers issue threats of physical violence and 9/11-style attacks, The Interview is being killed before it even premieres. But would the attackers have really blown up theaters?
By Sara Peters Senior Editor at Dark Reading, 12/17/2014
Comment8 comments  |  Read  |  Post a Comment
Government IT In 2014: GAO's Critique
William Welsh, Contributing Writer
News
From cloud computing to data center consolidation, software licensing to data transparency, the GAO was watching.
By William Welsh Contributing Writer, 12/15/2014
Comment1 Comment  |  Read  |  Post a Comment
Iowa Mobile ID Program Raises Privacy Questions
Eric Zeman,
News
The state of Iowa proposes using a mobile app as an option to a traditional driver's license -- but security questions abound.
By Eric Zeman , 12/12/2014
Comment4 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Cyber Security Standards for Major Infrastructure
Cyber Security Standards for Major Infrastructure
The Presidential Executive Order from February established a framework and clear set of security standards to be applied across critical infrastructure. Now the real work begins.
Flash Poll
Steal Our Slides
InformationWeek 2014 Hybrid Cloud Survey
InformationWeek 2014 Hybrid Cloud Survey
Mixing public and private can deliver the best of both cloud worlds for IT groups that can figure out where workloads work best and address potential security issues.
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
UBM's Future Cities
Latest Stories from UBM's Future Cities
View All from Future Cities