Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
More Stories
-
"Developing a common-sense approach to the e-recycling challenge"
-
Credit card and banking customers warned to be on guard against ID theft by phone
-
Includes policies and procedures for detecting, preventing, and mitigating identity theft
-
Ongoing concerns about hackers, malicious coders, customer data breaches and identity theft
-
Free downloads from the NIST Image Group open source server
-
Smart cards can be used for offline identity verification, when no access to a system or remote database is possible, an important feature for law enforcement officials
-
CIO of Montgomery County, Maryland to Chair
-
American Library Association and Information Technology Association of America voice concerns over new bill
-
E-mails purporting to come from FirstGov.gov are phony
-
Individuals and families will have access to i-SAFE programs, expertise, and training at Neighborhood Network centers to help navigate the Internet safely and promote cyber safe communities
-
National Crime Prevention Council's identity theft campaign aims to help consumers take practical steps to protect their personal information
-
"National borders are virtually irrelevant to cybercriminals, making global cooperation absolutely critical in the battle against Internet-related crime"
-
Helped to better prepare 476 Michigan law enforcement officers to investigate identity theft, credit fraud and counterfeiting complaints
-
"Many organizations have made the news lately, thanks to network breaches and data theft -- and that's news we don't want"
-
Location verification system now insures jurisdictional compliance
-
Computer may have contained names, addresses, SSN's, DOB's, dates of military service, and medical information
-
"Recent reports that there is a 'major vulnerability' that criminals could use to 'enter countries illegally' are untrue"
-
More than half of survey respondents say their security concerns are rising -- particularly among those who have experienced breaches firsthand -- but consumers are not taking these incidents lightly
Most Read