Personnel office not the worst in terms of lax cybersecurity

The federal government has for years failed to take basic steps to protect its data from hackers and thieves, putting at risk everything from nuclear secrets to the private tax information of hundreds of millions of Americans, ...

Timeline: Roughly 4 weeks pass before gov't reveals hacking

The White House waited roughly four weeks before telling the public that hackers had stolen the personal information of millions of people associated with the federal government, two people directly involved with the investigation ...

Cybertheft of personnel info rips hole in espionage defenses

By exposing the names and addresses of foreign relatives, the cybertheft of private information on U.S. security clearance holders by hackers linked to China will complicate the deployment and promotion of American intelligence ...

Fed agency blames giant hack on 'neglected' security system

The agency that allowed hackers linked to China to steal private information about nearly every federal employee—and detailed personal histories of millions with security clearances—failed for years to take basic steps ...

Chinese hackers got US security files: report

A data breach of millions of US government employees allowed Chinese hackers to access sensitive information including security clearances of the workers and contractors, the Washington Post said.

Chinese hackers got sensitive military files: report

A data breach of US government workers allowed hackers to access sensitive information including security clearances of the workers and contractors, the Washington Post reported Friday.

Media can restrict insider trading

New ANU research has found the media can have a strong effect in reducing corporate insider share trading by repeating existing information about trades.

House passes bill designed to thwart cyberattacks

The House on Wednesday passed long-awaited legislation designed to thwart cyberattacks by encouraging private companies to share information about the attackers' methods with each other and the government.

page 6 from 13