Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
More Stories
-
Identity theft, fraud and other cyber crime is a constant threat to businesses and government, and costs of attacks are believed to exceed $100 billion per year
-
Identifies pitfalls in many proposed data breach notification bills and laws, such as "over-notification," where consumers are inundated with information
-
Index analyzes over 700,000 network connections across a wide range of devices -- and warns that widespread use of unsecured mobile laptops and devices threatens organizations' networks, data, and users
-
For all employees and contractors of the DC government
-
Stolen laptop contained law enforcement data on 110 individuals
-
First injunctions obtained against four companies
-
A 13.6 percent increase over 2004, says Gartner
-
"The Rhode Island Division of Motor Vehicles takes customer service very seriously in all aspects of service delivery, whether it's at the counter or on the Internet"
-
The National Filter Scheme will provide Australian families with the technology and support to protect their children in a rapidly changing online environment
-
The Australian Communications and Media Authority (ACMA) can issue formal warnings, infringement notices or even start court proceedings if telemarketing standards are breached
-
Spam from the entire Australasia region now accounts for less than 0.8 percent of global spam
-
Five major online companies form coalition and pledge one million dollars to protect children against Internet child exploitation
-
Report offers recommendations for government and business to improve identification and assessment of cyber disruptions, to coordinate responsibilities for Internet reconstitution
-
Federal agencies and military offices must take every caution to ensure the safety of sensitive personal information, says Tom Davis, Chairman, Committee on Government Reform
-
"Server based computing is an important ingredient in our efforts to reduce costs and improve service"
-
"They wanted to prevent the users from making any changes whatsoever to the system or applications, no addition of new software or drivers, no Internet access, and complete safety from all forms of malware, worms, viruses and keyloggers"
-
VA will provide one year of free credit monitoring to people whose sensitive personal information may have been stolen in the recent data theft incident
-
Credit monitoring and fraud watch services for veterans will increases costs to the FY 2006 VA information technology account
Most Read