Cybersecurity
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
More Stories
-
"Freddi may look like a happy green frog that just wants to be friends, but actually he's happy because he's just encouraged 82 users to hand over their personal details on a plate."
-
"We are optimistic that this initiative will prepare our children to use the Internet cautiously and safely and help educators and parents provide children with the guidance and assurance they need to do so confidently.''
-
"Panda burning joss-sticks" worm stole usernames and passwords.
-
Will serve as a useful and practical companion to NASCIO's "Insider Security Threats: State CIOs Take Action Now!"
-
"We sincerely apologize and regret this unfortunate incident, and we are taking every step necessary to prevent this from happening again."
-
"Protecting data that is stored on devices outside the confines and control of the corporate network is a problem for which many companies simply do not have a solution."
-
"Anyone who steals the identity and victimizes a military member or his family will now be facing hard federal time. No probation. Period."
-
Trojan horse sent out disguised as malicious greeting cards.
-
The Arizona project, much like the agreement reached with the states of Washington and Vermont earlier this year will serve as another alternative available to U.S. citizens to satisfy WHTI requirements.
-
New tool helps schools evaluate their security programs against national average.
-
"Scammers are using what looks like a friendly greeting card to attack your computer and steal your good name."
-
"Unemployment insurance plays a critical role in helping workers persevere through tough times ... This funding will boost states' efforts to secure UI systems against fraud and ensure that those in need receive assistance."
-
While 46 percent of small and medium sized business IT managers say they have software to protect company confidential data, 81 percent do not use software to block the use of peer-to-peer applications, block USB devices, control the use of instant messaging, or stop spyware from sending out information to external sources.
-
According to the study, the more mobile an end user is, the more likely he is to send confidential information via Instant Messaging or Web mail.
-
Spam "E-card" used as disguise for malware.
-
New York, Houston and San Francisco are top three in preparedness.
-
When Susan started receiving threatening messages on her MySpace account, she knew she'd made a mistake.
-
Experts point to a number of disadvantages for spammers who try and use PDFs in their spam campaigns which may explain its decline.
Most Read