Cybersecurity
-
At least three states have taken action following the cyber attack, which exposed sensitive personal and medical information. Hackers accessed a company network during a nearly three-month period.
-
Federal lawmakers reactivated the State and Local Cybersecurity Grant Program earlier this month — but the Department of Homeland Security, which oversees it, is in partial shutdown.
-
The city currently cannot process some online credit card payments, because of a cyber attack on one of its payment gateway providers. Officials are working to stand up a secure alternative solution.
More Stories
-
Despite claims made in e-mails circulating on the Internet, consumers should not be concerned that their cell phone numbers will be released to telemarketers in the near future.
-
The two men used a variety of tricks to try and hide their whereabouts from the authorities, such as logging in remotely to servers in Amsterdam.
-
Security company aims to protect customers from botnet-generated data compromise by training security professionals at key government, education and industry events.
-
"One of the more interesting paradoxes, particularly for San Diego and other regions struggling to divine "smart growth" solutions, is that the more we live and work in cyberspace, the more important real place becomes."
-
"Based on his legal experience and his long record of public service, I am confident Paul will build on our administration's achievements in ensuring state government is open and transparent."
-
"As long as our children use the Internet, there will unfortunately be predators who seek to exploit them."
-
Posting photos and creating social networking profiles increases stranger contact rates.
-
"Social networking sites, popular among young people, have quickly gained members and appeal, but also act as a magnet for those who would prey on the young ... Our agreement with Facebook offers a new model of cooperative action that balances the freedom offered by the Internet with the necessary protections for children traveling on the information superhighway."
-
"RFID technology is not in and of itself the issue. RFID is a minor miracle, with all sorts of good uses ... But we cannot and should not condone forced 'tagging' of humans. It's the ultimate invasion of privacy."
-
"The Identity Theft Enforcement and Restitution Act will give federal prosecutors the tools they need to combat identity theft."
-
Thirty-six states pass, 14 fail, 21 earn higher grades in nationwide study.
-
Center for Ethical Identity Assurance initiatives include the development of a draft Consumer Bill of Rights to protect personal information and safeguard against identity fraud.
-
"MP3 spam is a natural progression from PDF and Excel spam whereby spammers are exploiting a new file format to be able to send spam. This is their latest attempt to evade anti-spam filters."
-
Phishers often use the correct Web address as the name of the link but code the link to take you to the bogus address.
-
In April, Wisconsin began enforcing a new law to prohibit illegal immigrants from getting driver's licenses, but several longtime legal residents ran into unexpected hurdles to keeping their driving privileges under the rules.
-
"IT executives are taking a fresh, hard look at their disaster recovery and business continuity strategies."
-
"If you visit the site and give it your personal information the chances are that you will be bombarded with unwanted junk e-mail until hell freezes over."
-
An expert's advice for those in charge of databases, and the private information they contain.