Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
More Stories
-
Spam spread bogus investment advice.
-
Interoperability between existing IdM solutions will provide significant benefits such as increased trust by users of online services as well as cybersecurity, reduction of SPAM and seamless "nomadic" roaming between services worldwide.
-
"There are safe neighborhoods and safe Web domains, and then there are places no one should ever visit."
-
Errors with voting machines, delays in voting, inadequate security cited.
-
Enacted 40 years ago this week
-
Three month investigation of Arizona Homeland Security Fraudulent Identification Task Force (AFIT) uncovers one of the largest manufacturers of fraudulent identification in Southern Arizona.
-
"Under no circumstances should users download applications through pop-up ads, or shortcuts that suddenly appear on the desktop."
-
"The Commission's Europe-wide public consultation in 2006 identified a strong lack of awareness and considerable concern among citizens."
-
Scammers pretend to be bankers in an effort to steal personal information.
-
Consumers to be careful of e-mails that promise tax refunds.
-
"Combating identity theft is one of my top priorities in the consumer protection arena."
-
"This powerful tool will help protect both the victims of child abuse and neglect and the public servants charged with protecting them."
-
Spam Levels and Associated Costs Are the Highest in History
-
"Scam artists are very good at using current events to add an air of authenticity and urgency to their schemes."
-
"Consumers who get notice can act fast to protect their good names."
-
"This report demonstrates how widespread and sophisticated internet crime has become."
-
Cyber criminals continue to refine their attack methods in an attempt to remain undetected and to create global, cooperative networks to support the ongoing growth of criminal activity.
-
"This is a great new tool that improves everyone's ability to track important legislation and watch informative debates."
Most Read