Why did hackers target the federal Thrift Savings Plan? Details from the FBI and the TSP have been sketchy, and Sen. Susan Collins is demanding more information - including the reasons behind the delayed notification.
After firing off a letter to Apple Computer CEO Steve Jobs that questions the secret tracking, Sen. Al Franken schedules a May 10 hearing before a Senate Judiciary subcommittee he chairs on protecting mobile privacy.
What's embarrassing about the WikiLeaks episode isn't just the precarious position the publication of diplomatic cables put the U.S. in with its allies but the likelihood that one, low-level analyst accessed sensitive data without authorization and then leaked them.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.