Cybersecurity
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
-
The move places the state among a growing group of governments using the shared authorization framework to reduce duplicative vendor security assessments. GovRAMP evolved from StateRAMP last year.
-
A faux-phishing email crafted by students at Eminence High School in Kentucky snagged 14 staffers at the district. Another in late January, created with help from generative AI, persuaded 29 staffers to click the link.
More Stories
-
Managing identities online has become increasingly complex, cumbersome and costly. Now there's a way out of the mess.
-
24 additional red light cameras will be installed across Seattle in 2008.
-
Malicious Web sites show up in Google searches.
-
Legislation includes notification when data is compromised.
-
"Today, voters in general elections have the ability to either vote by absentee ballot or in person at a polling place. I think these choices ought to be preserved."
-
Three-year investigation revealed spamming operation that focused on stock "pump and dump" scheme.
-
Public advised to disregard e-mails which claim Lt. Governor lost his passport.
-
TechPresident, a Web site "covers how the 2008 presidential candidates are using the Web and ... how content generated by voters is affecting the campaign."
-
"Secret Crush" application potentially downloads unwanted applications such as pop-up advertising.
-
Presidential elections, Olympics, Web 2.0 services, social networks and bots dominate list.
-
"Misconceptions concerning the operation of electronic voting systems, if left unanswered, can have a corrosive effect on voter confidence if they are not taken seriously and addressed with clear, factual information."
-
Windows users at risk from critical vulnerabilities.
-
"The whole purpose of identity cards is to protect people's identity and the way to do that is to use ... biometrics so that use of the information cannot be triggered other than by the facial or fingerprint data that are part of the biometrics."
-
Web 2.0 increases probability of malware, inadvertent data leakage, but is important to next generation of employees entering the workforce.
-
ID Theft Protection will be provided to voters whose information was on laptops stolen from local Election Commission.
-
Keystroke logging software was installed in hotel business centers and Internet cafes around the world.
-
Oversight Committee report exposes various security deficiencies.
-
REAL ID will address document fraud by setting specific requirements that states must adopt for compliance.