Cybersecurity
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
More Stories
-
The part technology plays in helping and/or hindering people with disabilities.
-
An ongoing federal crackdown against the illegal distribution of copyrighted movies, software, games and music over P2P networks employing the BitTorrent file sharing technology.
-
Hackers attack unpatched flaw in Microsoft code to penetrate servers.
-
-
"State managers and employees have a greater responsibility than ever to protect state technology resources and minimize the insider threat. It's everyone's job."
-
The dual strengths of security and privacy protection are propelling the growth of smart card use by governments.
-
"The increase in reports ... is due in part to the increased awareness of our organization but also to the identification of a growing trend in the use of remote image storage facilities."
-
"Election officials, computer security experts, citizen advocacy groups, and others have raised significant concerns about the security and reliability of electronic voting systems."
-
23 percent of teens who have been contacted by a stranger online say they felt scared or uncomfortable because of the online encounter.
-
"This is the second case of a combined attack that we have recorded in the last two weeks."
-
Attorney General lauds passage of bill which toughens penalties against Internet predators.
-
"Bandido" could face up to 10 years in prison.
-
"Malware creators want to make the most out of each infection, that's why they include several features in a single malware specimen."
-
Identity theft "is a personal invasion, done in secret, that can rob innocent men and women of their good names."
-
-
A third of enterprises surveyed believe a major breach could put their companies out of business.
-
"The CyberTipline is one of the most powerful tools available to enforce a zero tolerance policy regarding child sexual exploitation, including child pornography on the Internet."
-
"The advent of new electronic currency systems increases the risk that criminals, and possibly terrorists, will exploit these systems to launder money and transfer funds globally."
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market