A website configuration issue affecting itmanagement.com, a property owned by New York City digital publisher Ziff Davis, can be exploited to access a company database full of…
DHS is using a special government acquisition authority called an Other Transaction Solicitation to help "non-traditional" contractors to develop technology solutions to "some of the toughest threats…
The disclosure process currently followed by federal agencies — which guides exactly how and when the government should tell tech firms about flawed computer code they find…
Auditors discovered that 27 members of the 18F team routinely used personal email accounts to send work-related emails, without copies being forwarded to their official work accounts.…
"After the 2016 election, it's starting to look as if the Russians had the right idea," said Geers. The key issue is bigger than just cybersecurity. "We…
A group of highly talented and well resourced hackers are spying on the Israeli Defense Force by hacking into the personal smartphones of individual soldiers, according to…
Journalists sometimes need to work under a veil of anonymity, and in the 21st century, that often means visiting websites without anyone knowing that a major investigation…