NEWS & ANALYSIS
Feb 17, 2009 -The U.S. Computer Emergency Readiness Team (US-CERT) has revealed to USA Today that cyberattacks against government computer networks increased by more than 40 percent in 2008.
Feb 11, 2009 -Representative Pete Hoekstra, the ranking member on the House Intelligence Committee, is defending his decision to Twitter his whereabouts in Iraq in real time, despite the secretive nature of the trip, reports Fox News.
Feb 10, 2009 -The Federal Aviation Administration has fallen prey to hackers looking to steal personal information, just as President Barack Obama on Monday ordered a 60-day review of the government's cybersecurity policies.
Feb 09, 2009 -Spam grew by 4.9 percent in January, according to MessageLabs' first report since their integration into Symantec.
Jan 30, 2009 -Hard-drive vendors now have three new encryption standards to adhere to as they manufacture their products to help eliminate data breaches.
Jan 23, 2009 -The Transportation Security Administration is telling applicants for the Transportation Worker Identification Credential to only trust information on the TSA's Web site or its information hotline, according to Land Line Magazine.
Jan 23, 2009 -Millions of computers worldwide running Microsoft Windows are under assault by a multistage worm attack, reports The New York Times.
Jan 22, 2009 -The data breach at Princeton, New Jersey-based Heartland Payment Systems, which processes payment card transactions, could total over a 100 million card accounts compromised, possibly making it the largest ever.
Jan 15, 2009 -In an essay for former intelligence officers, a government cybersecurity advisor argues the United States faces a cybersecurity crisis that needs immediate attention before it undermines the nation's economic and cybersecurity.
Jan 14, 2009 -Underscoring the importance of cybersecurity for the private and public sectors, a coalition of the world's leading cybersecurity organizations has jointly released a list of the 25 most dangerous programming errors that can lead to vulnerabilities easily exploited by cybercriminals and cyberspies.