Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
More Stories
-
Company donates software, analyst to help prevent cybercrime.
-
Florida's Sarasota County brings the dream of intergovernmental cooperation to life.
-
And 80 percent have never been hacked, says a new survey
-
Seeks comment on how EAS can be improved
-
The "paper", which is made of copper and plastic, keeps wireless signals inside buildings while allowing cellular signals to pass through
-
Once installed, Backdoor.Bardor.A allows full control of the handheld system when it is restarted
-
$384,000, as part of the National Criminal History Improvement Program
-
Surveillance cameras connected to insecure networks could be targeted
-
The W64.Shruggle "proof-of-concept" virus' impact limited to systems running 64-bit versions of Windows
-
Funds to be used for cyber-security
-
SB 1841 requires employers to give employees a one-time written notice if they plan to read e-mail, track Internet use, or use other electronic devices to monitor employees on or off the job
-
Progress report and 10 things elections officials can do to secure the vote this November
-
In the first phase of the program the state will deploy anti-fraud systems at four DMV locations
-
A five-year program will fund new research and stimulate efforts to recruit students into security research.
-
Some provisions relate to penalties for electronic attacks; others set the terms for ISPs to share subscriber information with government agencies.
-
A district court had ruled that e-mails gathered after St. Paul police faxed a search warrant to a major ISP violated the suspect's Fourth Amendment rights.
-
A database of fingerprints, faces and voices of suspected terrorists is being used at U.S. ports of entry.
-
Investigators reported finding widespread weaknesses at 24 of the U.S. government's largest agencies and departments.
Most Read