Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: hackers
FBI officials said the bureau never asked for and never possessed the database that the group, which calls itself AntiSec, is posting on a website.
Hackers are using official Defense Department seals in an online scam.
The Army has awarded a contract for cyber maneuvering technology so that network administrators can stay a few steps ahead of hackers.
Yahoo confirmed that a hacker group stole, then posted 450,000 unencrypted user-names and passwords from one of its services.
Hackers broke into computers at hotel giant Wyndham Worldwide Corp. three times in two years and stole credit card information belonging to hundreds of thousands of customers. Wyndham didn't report the break-in in corporate filings even though the Securities and Exchange Commission wants companies to inform investors of cybercrimes.
Federal officials have arrested two dozen hackers in a cyber-crime ring that stretches from Japan to middle America.
A Nazi hacker group is claiming credit for shutting down Twitter yesterday morning. The micro-blogging site said the outage was caused by a server bug, not hackers.
A data breach at the Utah Department of Health has left hundreds of thousands of Medicaid recipients and others vulnerable.
Hackers from the group Anonymous claim to have broken into Chinese government computers, with the ultimate objective to take down the country's firewall.