Cybersecurity
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
More Stories
-
New safeguards will help prevent unauthorized access to customer proprietary network information.
-
Claims he broke into the networks to uncover confidential information about anti-gravity propulsion systems and extraterrestrial technology.
-
"DOE employees so far appear to have escaped identity theft -- but the threat remains once private personal information has been compromised."
-
"Users should be on their guard against the possibility of new malicious codes appearing."
-
"Virtualization, as with any emerging technology, will be the target of new security threats."
-
Survey shows vast majority concerned companies may sell their information or are not doing enough to keep it safe from theft.
-
-
About 46,000 people possible affected by unauthorized access to records.
-
"This is truly a nationwide solution, and it's the only way to tackle the Meth problem because these offenders rarely respect county or state borders.
-
Secretary of State issues directive.
-
"The addition of the online searchable database and expense reporting forms enables greater disclosure of lobbying activities."
-
"The Court continues to acknowledge what we have seen from four successful elections in Indiana under our Photo ID law -- this is a common-sense way to protect honest voters and to improve confidence in our elections."
-
Director of Public Safety urges people to beware.
-
"This dominance is not so much due to any special features of Gaobot or Sdbot, but simply because their code is much more widely available on the Internet."
-
"We can look forward to even greater access to the election process."
-
Teams assume control of an "operational" network from a fictitious business complete with e-mail, Web sites, data files, users, and network traffic.
-
"Hackers will show no mercy in taking advantage of these vulnerabilities."
-
Will be responsible for issues relating to the Freedom of Information Act.