Cybersecurity
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
-
From compromised TVs to AI-powered house chores, exploring the evolving global threats and why human-centric security matters more than ever.
More Stories
-
No computer, operating system or software is completely invulnerable to the types of attacks to which users can unwittingly expose themselves.
-
A "panopticon" that encourages self-censorship through the perception that users are being watched.
-
Called a remarkable tool that helps government and industry to protect wireless networks and other electromagnetic emissions from hacking and eavesdropping.
-
Information stolen included approximately 1,819 consumers names and Social Security numbers.
-
Allegedly bought expensive jewelry, cars and luxury vacations from the proceeds of their criminal acts.
-
Cybercriminals planted malicious code on Web site, has since been fixed.
-
"There are no indications that the data from the DRS laptop has been accessed. However, we are offering these seminars to be proactive and give Connecticut taxpayers, particularly those affected by the theft of the laptop, the kind of tools they would need to protect themselves against identity theft."
-
Spammers netted more than $20 Million in stock scam.
-
"Do you know where your child goes and who your child is with when they're online?"
-
"The tape contains information on nearly every bank account held by state agencies ...which could total billions of taxpayer dollars."
-
"In response to the fact that three of the four leading academic researchers proposed for Ohio's voting machine study participated in the recent California voting machine study, Damschroder stated, 'It demonstrates an inherent bias that would likely color any report that they give.'"
-
Report out today reveals that cybercriminals are adopting business-like strategies to perform malicious activities.
-
"The CFI apparently believes that real software designers need to be replaced by bureaucrats, who will now be in the business of writing code for computer programs and forcing intellectual property to be given away without adequate compensation."
-
Citizens' concern over privacy issues still a major factor.
-
"David's broad background and experience in the IT security arena make him the ideal person to serve as the Chief Information Security Officer for the State."
-
Nearly one in four reported that breaches originated internally.
-
Automated security configuration management solution empowers compliance with OMB directive to lock down Windows XP and Vista.
-
Identity Theft Task Force will "work with state and local governments . . . to highlight and discuss the vulnerabilities created by the use of SSNs and to explore ways to eliminate unnecessary use and displays of SSNs."
Most Read