Cybersecurity
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
More Stories
-
"We will continue working hard to make sure that everyone affected by this data theft has up-to-date information as we confirm it."
-
"I'm not going to stand by and watch ES&S ignore the State of California and, in particular, the voters of Los Angeles County by refusing to abide by the certification conditions that were imposed when ES&S's InkaVote Plus Voting System was certified last year."
-
"Whether committed with a gun or a keyboard -- theft is theft."
-
28-year-old man apprehended in Valencia, Spain.
-
"We live in a wide open world where information can very easily be copied, sent or shared, and over 100 million consumers have been notified of a breach of their personal information."
-
Two men convicted of running international pornographic spamming business.
-
Study tracked responses from 1600 corporate computer end users across U.S., U.K., Germany and Japan.
-
"Scam spam works best by providing recipients with a sense of familiarity and legitimacy, either by creating the illusion that the e-mail is from a friend or colleague, or providing plausible warnings from a respected institution."
-
Malware menace now "significant focus" for tech support services, identity management firms and law enforcement.
-
-
Windows users risk being duped by animation smokescreen.
-
The technology in the patent application detects counterfeit APs by finding anomalies in wireless traffic.
-
New application uses the continuous wireless pings emitted by Wi-Fi transmitters to accurately calculate the position of a mobile device.
-
Malicious spam posing as fake vulnerability patch leads to Trojan horse infection.
-
"Today, we are sending a strong message to the federal government -- we are not about to be coerced into another unfunded federal mandate, especially not one that we will pay for with our privacy."
-
One third of all teenagers who use the Internet say they have been targets of a range of annoying and potentially menacing online activities.
-
Justice Department urges public not to respond to e-mail.
-
Congress is currently considering legislation to set a national standard that could require higher percentages of election results to be audited in a post-election hand count.
Most Read