Cybersecurity
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
-
The move places the state among a growing group of governments using the shared authorization framework to reduce duplicative vendor security assessments. GovRAMP evolved from StateRAMP last year.
-
A faux-phishing email crafted by students at Eminence High School in Kentucky snagged 14 staffers at the district. Another in late January, created with help from generative AI, persuaded 29 staffers to click the link.
More Stories
-
-
All of the conference presentations are available for review and download from NASCIO's Web site.
-
Clark School of Engineering issues guidelines for fending off wireless 'parasites,' or harm from unauthorized access points.
-
Despite claims made in e-mails circulating on the Internet, consumers should not be concerned that their cell phone numbers will be released to telemarketers in the near future.
-
The two men used a variety of tricks to try and hide their whereabouts from the authorities, such as logging in remotely to servers in Amsterdam.
-
Security company aims to protect customers from botnet-generated data compromise by training security professionals at key government, education and industry events.
-
"One of the more interesting paradoxes, particularly for San Diego and other regions struggling to divine "smart growth" solutions, is that the more we live and work in cyberspace, the more important real place becomes."
-
"Based on his legal experience and his long record of public service, I am confident Paul will build on our administration's achievements in ensuring state government is open and transparent."
-
"As long as our children use the Internet, there will unfortunately be predators who seek to exploit them."
-
Posting photos and creating social networking profiles increases stranger contact rates.
-
"Social networking sites, popular among young people, have quickly gained members and appeal, but also act as a magnet for those who would prey on the young ... Our agreement with Facebook offers a new model of cooperative action that balances the freedom offered by the Internet with the necessary protections for children traveling on the information superhighway."
-
"RFID technology is not in and of itself the issue. RFID is a minor miracle, with all sorts of good uses ... But we cannot and should not condone forced 'tagging' of humans. It's the ultimate invasion of privacy."
-
"The Identity Theft Enforcement and Restitution Act will give federal prosecutors the tools they need to combat identity theft."
-
Thirty-six states pass, 14 fail, 21 earn higher grades in nationwide study.
-
Center for Ethical Identity Assurance initiatives include the development of a draft Consumer Bill of Rights to protect personal information and safeguard against identity fraud.
-
"MP3 spam is a natural progression from PDF and Excel spam whereby spammers are exploiting a new file format to be able to send spam. This is their latest attempt to evade anti-spam filters."
-
Phishers often use the correct Web address as the name of the link but code the link to take you to the bogus address.
-
In April, Wisconsin began enforcing a new law to prohibit illegal immigrants from getting driver's licenses, but several longtime legal residents ran into unexpected hurdles to keeping their driving privileges under the rules.