Cybersecurity
-
Tulsa International Airport recently suffered a ransomware attack, a spokeswoman confirmed. The facility is independent of the city of Tulsa, which suffered its own such incident in early 2019.
-
City officials are trying to determine the full extent of systems impacted by a ransomware attack, which paralyzed phone and computer systems in multiple departments beginning early Wednesday.
-
LSU will work with Argonne National Laboratory in Illinois and Oak Ridge National Laboratory in Tennessee as a “bridge” between national energy research and the implementation of research findings on the Gulf Coast.
More Stories
-
Tim Pawlenty calls for more "cooperative plans and action steps in areas such as information sharing, defensive tactics, system improvements, crisis response and management, as well as the need for more joint efforts with government."
-
For those who sign up for care, he says there's nothing consumers can do to protect themselves.
-
In an interview on German TV, Edward Snowden reveals that the NSA is involved in industrial espionage.
-
The lab offers students cutting-edge computer technology to hone their skills in areas such as encryption, malware and cyber attacks.
-
Target's huge data breach brought into the limelight once again the neverending battle against thievery.
-
Security experts want to use a technical system to monitor mobile telephone calls, emails, and online messenger services and chats, and drones and positioning systems that can stop attacks from the sea.
-
In some instances, Obama clearly tried to strike a balance between protecting Americans from terrorism and addressing the concerns about privacy. But in other instances, he just didn’t decide.
-
Startup's technology turns the hackers' techniques against them.
-
Emergency managers are increasingly concerned about cyberattacks on 911 and other public safety systems.
-
Since 1952, the NSA has expanded almost nonstop. But until 2001, the agency still faced limits on what kind of information it could gather.
-
An outside analysis of the site by security experts identified several significant issues which leave it vulnerable to a breach.
-
There is no evidence that intelligence agencies abused power, according to Obama.
-
Wireless equipment installed on computer hardware enables covert surveillance even if a computer is kept offline.
-
After the nation’s largest state-agency security breach, the agency wants $3.5 million in 2014-15 to develop its new chief security information officer’s team, among other things.
-
A Department of Energy grant enlists Georgia Tech researchers in an effort to protect the nation's utility infrastructure.
-
We all know security in cyberspace is a critical topic, but the problem is that we simply do not understand it, which means we can be taken advantage of.
-
As more industrial devices connect to computer networks, IT security professionals learn they have more things to watch out for.
-
Twenty-five percent of respondents are planning to move their data outside the U.S., and security is the top concern of 96 percent of those surveyed.
Most Read
- Montana High Schools, Colleges Prepare Students to Work With AI
- Communication That Builds Credibility: How Oregon Corrections Modernized Outreach
- Police Department in Laredo, Texas, Expands Use of AI
- New Mexico Bill Would Limit Sharing of License Plate Data
- UW-Milwaukee's 'Retrolab' Conveys World Before Cellphones, Social Media