Cybersecurity
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
-
While overall ransomware attack numbers remained steady, higher education institutions drove a sharp rise in exposed records, fueled in part by third-party software vulnerabilities.
-
To guard against phishing-based ransomware attacks, the state is outfitting 161 of its jurisdictions and other public-sector organizations with hardware-based protection. And it's not alone.
More Stories
-
"It is essential not to run any file that arrives from unreliable sources."
-
"The problem with user name/password is once you get it, you're in."
-
Sites like IRS.com, IRS.net, and IRS.org are owned by for-profit companies that make money by offering services that, in many cases, taxpayers could get for free through the IRS's official Web site, IRS.gov.
-
"The constant struggle between security personnel and malware authors is an arms race -- no matter how quickly security professionals design new safeguards, the bad guys seem to make similar advances."
-
"It's troubling that some of the agencies with the most sensitive information continue to score poorly on this."
-
"While FISMA is an important first step in providing heightened information security awareness for agencies, there are not nearly enough consequences for those agencies who fail to comply."
-
CEO mocks senator over old adage.
-
"Testing protocols and electoral procedures are in place to ensure fair, accurate and accessible elections."
-
Jacksonville man used grooming techniques to luring child to his home.
-
-
The part technology plays in helping and/or hindering people with disabilities.
-
An ongoing federal crackdown against the illegal distribution of copyrighted movies, software, games and music over P2P networks employing the BitTorrent file sharing technology.
-
Hackers attack unpatched flaw in Microsoft code to penetrate servers.
-
-
"State managers and employees have a greater responsibility than ever to protect state technology resources and minimize the insider threat. It's everyone's job."
-
The dual strengths of security and privacy protection are propelling the growth of smart card use by governments.
-
"The increase in reports ... is due in part to the increased awareness of our organization but also to the identification of a growing trend in the use of remote image storage facilities."
-
"Election officials, computer security experts, citizen advocacy groups, and others have raised significant concerns about the security and reliability of electronic voting systems."
Most Read