Cybersecurity
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
More Stories
-
Registered passengers have access to a separate line through airport security checkpoints by using an identity card containing their encrypted fingerprint or iris images.
-
"Maybe it would be better if people used old fashioned letters and stamps to send their good wishes if e-cards are going to increasingly become a method for spreading electronic attacks."
-
"While good headway has been made in clamping down on the hackers that sell stolen identities online, more action needs to be taken to stop the criminals that buy and use this information."
-
One project is aimed at decreasing phoney e-mail messages asking for personal financial information. Another would revise standards so that equipment exploring Mars can send photos back to the Internet for researchers to see immediately.
-
Applicants start their membership at the Web site and complete the process in person at an enrollment center where their biometrics (fingerprints and iris images) are captured.
-
Enhance the security of state driver's licenses; possible compliance alternative to Western Hemisphere Travel Initiative (WHTI) requirements
-
"Without that voter registration database, it would not have been possible to track these issues."
-
"Freddi may look like a happy green frog that just wants to be friends, but actually he's happy because he's just encouraged 82 users to hand over their personal details on a plate."
-
"We are optimistic that this initiative will prepare our children to use the Internet cautiously and safely and help educators and parents provide children with the guidance and assurance they need to do so confidently.''
-
"Panda burning joss-sticks" worm stole usernames and passwords.
-
Will serve as a useful and practical companion to NASCIO's "Insider Security Threats: State CIOs Take Action Now!"
-
"We sincerely apologize and regret this unfortunate incident, and we are taking every step necessary to prevent this from happening again."
-
"Protecting data that is stored on devices outside the confines and control of the corporate network is a problem for which many companies simply do not have a solution."
-
"Anyone who steals the identity and victimizes a military member or his family will now be facing hard federal time. No probation. Period."
-
Trojan horse sent out disguised as malicious greeting cards.
-
The Arizona project, much like the agreement reached with the states of Washington and Vermont earlier this year will serve as another alternative available to U.S. citizens to satisfy WHTI requirements.
-
New tool helps schools evaluate their security programs against national average.
-
"Scammers are using what looks like a friendly greeting card to attack your computer and steal your good name."
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market