Cybersecurity
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
More Stories
-
"Hi, I'm Casper, I am a bored Sun developer and I wrote this piece of code."
-
Top ten threats and hoaxes reported in February 2007.
-
"We will work closely with states to implement these standards and protect American's privacy against identity theft and the use of fraudulent documents."
-
The group claims the total cost of issuing new licenses with RFID chips could reach $17.4 billion and the average cost of a license would shoot from between $10 to $20 to more than $93.
-
"This is an issue that needs to be discussed in every home, every schoolroom and every business across the state."
-
The four-year, $44 million contract to provide the hardware, software, services and consulting for the Medi-Cal system.
-
"Storm Worm," continues to severely impact worldwide mailboxes in successive waves.
-
"We are taking steps to notify you of this, consistent with our policy, and with the sensitivity around all HIV related issues."
-
"The aim of malware creators is purely financial and Trojans and spyware are the best types of malware for this purpose."
-
The biggest threat to companies' data is overwhelmingly internal, due either to malicious or negligent insiders or to faulty controls and oversight.
-
Amount of malware detected in 2006 same as past 15 years, combined.
-
Computers were accessed using Trojan horses and social engineering tricks.
-
"Today's network, system and security administrators are faced with many challenges ranging from limited resources to unreasonable business demands to determined attackers."
-
Includes reporting requirements for the DHS.
-
"LEAP will be supported by the participation of local law enforcement officers and their respective agencies on an annual subscription basis and subsidized by fee-based services that are made possible by the LEAP infrastructure."
-
"Rootkit techniques are becoming increasingly popular among malware creators."
-
-
"Many of the offenders were not incarcerated or were about to be released when the database matches took place."
Most Read