Cybersecurity
-
A contract with Motorola Solutions will enable the county to do a better job of safeguarding its emergency radio communications system. Tower sites and radio dispatch consoles will get 24/7 security.
-
With its longtime federal support now withdrawn, one of the country’s largest public-sector cybersecurity support organizations has moved to a new paid model where states handle the bill for its services.
-
Legislation proposed by Sen. Mary Elizabeth Coleman, R-Arnold, would do away with several state boards and commissions. If it becomes law, the Missouri Cybersecurity Commission would be among them.
More Stories
-
The recent cyberattack against the city of Florence is prompting officials in Athens to invest in cybersecurity enhancements. Among the steps being taken are backup software and storage devices.
-
The legislation temporarily bans facial recognition in state schools and requires the state Education Department to study the issue and craft regulations. Opponents of the technology have criticized its use in schools.
-
According to college officials, 50 computers and the SUNY Erie Community College website were disabled by a malware attack early Wednesday. Colleges and universities have been an increasingly popular target for cybercriminals.
-
Many people who participate in disinformation campaigns are unwitting accomplices and much of the information they spread is accurate, which makes it all the harder to identify the campaigns.
-
Multiple U.S. officials on Tuesday slammed the Chinese government for allegedly deploying malicious cybertactics to steal intellectual property. Since the pandemic began, hackers have increasingly targeted research data.
-
Staffers have asked the city council to approve $4.4 million in upgrades to data center hardware and software, cybersecurity tools and network hardware. But leaders have asked to hear from vendors before they decide.
-
The Russian cyberthreat, now targeting coronavirus vaccine research, goes back over three decades, extends into the country's educational systems and criminal worlds, and shows no signs of letting up.
-
A large-scale downing of websites across the Internet initially looked like a cyberattack, but it was really just a minor malfunction with one of the world's largest Web infrastructure providers.
-
Patrick Wright has been selected to serve as the state’s permanent information security officer, replacing Chris Hobbs, who is now serving as the director of IT for the Diocese of Lincoln, Neb.
-
Chilton County officials say they don’t yet know what information was compromised in the ransomware attack two weeks ago, but around 70 computers were targeted in the cyberincident.
-
Russians don’t have to change votes. They can change minds.
-
Hackers demonstrated they can take over Twitter's technology infrastructure, a brazen move that hints at how such an attack could destabilize society.
-
The hackers who turned the high-profile Twitter accounts of world leaders and celebrities into tools for anonymously receiving bitcoin targeted 130 people and were able to reset the passwords of 45, officials said.
-
The man who spearheaded legislation to formally structure Kansas’ IT security has moved on to county-level government. His successor is a member of the state’s IT security council, Jeff Maxon.
-
While bitcoin is supposed to be difficult to track, a number of tracing firms have sprung up to help law enforcement. Law enforcement agencies have been able to track stolen bitcoins many times in the past.
-
Sacks, Indiana's CISO since 2017, quietly left the Office of Information Technology in March. He has been replaced by interim CISO Hemant Jain, who had been serving as the state's director of security operations.
-
The cyberespionage group code-named Cozy Bear has been targeting institutions involved in COVID-19 vaccine research. Cyberintelligence agencies in the U.S., United Kingdom and Canada confirmed the efforts.
-
If approved, the bill would remove a provision of public records law that allows police agencies in the state to withhold information about whether they use powerful surveillance tools to investigate crimes.
Most Read