Cybersecurity
-
The new information security leader, previously part of its technology organization, was formerly with Dallas, where he helped stand up that city’s first-ever cyber fusion and security operation center.
-
The latest in a series of text message schemes, this one messages residents’ cellphones seeking information. The state’s Department of Motor Vehicles commissioner said the agency does not ask for personal data over the phone.
-
Microsoft, the U.S. Justice Department, Europol and Japan’s Cybercrime Control Center are targeting the Lumma Stealer malware in an international operation. A court order has empowered the group to start taking it down.
More Stories
-
Affected systems have been taken offline as officials work to fix it, and the city's website was inaccessible Monday, with Coeur d'Alene's mayor, Jim Hammond, confirming the city's phone system was down.
-
Fraud cases and the losses they create — especially those that involve cyber attacks — are a growing problem for law enforcement in Oakland County, Mich., as well as for other counties around the country.
-
Danbury School District in Connecticut requested educational reserve funds from its local city council to cover expenses tied to a ransomware attack, including setting up a secure network and backing up data off site.
-
CISO Michael Makstman explains what it takes to secure San Francisco, how the city is approaching generative AI and the importance of sharing information in the Coalition of City CISOs.
-
The federal cybersecurity certification brought by FedRAMP ensures that electric vehicle charging networks have the security protocols in place to protect data held and managed by federal agencies.
-
A new report from U.S. News reveals that around 61 percent of survey respondents had their personal data breached at some point. Another 44 percent reported that they had this happen multiple times.
-
California’s largest state employee union fell victim to a ransomware attack last month that likely exposed Social Security numbers, home addresses, birth dates and other sensitive information.
-
A proposal to create a cyberstalking task force is before state lawmakers for the third year in a row. The task force would be charged with developing best practices for preventing online harassment and for treating victims.
-
According to a Government Technology analysis of CISA data, only 42 percent of counties have registered .gov domains. Now that the federal government is making it easier than ever to get a .gov domain, will more agencies make the change?
-
Ivanti, which has verified the cybersecurity issues with its own investigation, is working to release patches and mitigations, but in the meantime there are precautions that users can take.
-
Lawmakers in the Pennsylvania state house recently met with representatives of municipal governments, industry and academia last week to discuss cybersecurity threats to vital systems and infrastructure.
-
Using a script, the scammer contacts an individual, typically through a dating or social media app or via phone calls and text messages that are meant to appear to have been misdialed.
-
A June 2023 hack of the city of Fort Worth’s website may have leaked more information than initially thought. A review by an outside firm revealed hackers may have accessed driver’s license numbers, dates of birth and more.
-
Portions of the Unified Judicial System portal — a public database providing access to criminal and civil docket sheets and schedules for upcoming court appearances — are unavailable.
-
Election watchers and technology experts say the rise of publicly available artificial intelligence will present a great threat to the ability of voters to separate truth from fiction as a vital election draws closer.
-
The 17-day trial questioning the security of Georgia’s Dominion voting machines ended Thursday, leaving the final decision in the hands of U.S. District Judge Amy Totenberg.
-
Cyber attacks continue to threaten U.S. courts, but an event series slated for later this year aims to help judicial officials prepare for and recover from cyber incidents.
-
More invasive devices have prompted new debates about privacy and freedom. But it’s important to keep in mind that other technologies already sense and shape our thoughts, a neuroethicist argues.