Cybersecurity
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on helpdesk tickets to improve incident response plans, or to troubleshoot code.
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
More Stories
-
Washington Post reports government sites with personal information, including SSNs, readily available.
-
The road to better information security, ironically, passes through better information sharing.
-
Managing identities online has become increasingly complex, cumbersome and costly. Now there's a way out of the mess.
-
24 additional red light cameras will be installed across Seattle in 2008.
-
Malicious Web sites show up in Google searches.
-
Legislation includes notification when data is compromised.
-
"Today, voters in general elections have the ability to either vote by absentee ballot or in person at a polling place. I think these choices ought to be preserved."
-
Three-year investigation revealed spamming operation that focused on stock "pump and dump" scheme.
-
Public advised to disregard e-mails which claim Lt. Governor lost his passport.
-
TechPresident, a Web site "covers how the 2008 presidential candidates are using the Web and ... how content generated by voters is affecting the campaign."
-
"Secret Crush" application potentially downloads unwanted applications such as pop-up advertising.
-
Presidential elections, Olympics, Web 2.0 services, social networks and bots dominate list.
-
"Misconceptions concerning the operation of electronic voting systems, if left unanswered, can have a corrosive effect on voter confidence if they are not taken seriously and addressed with clear, factual information."
-
Windows users at risk from critical vulnerabilities.
-
"The whole purpose of identity cards is to protect people's identity and the way to do that is to use ... biometrics so that use of the information cannot be triggered other than by the facial or fingerprint data that are part of the biometrics."
-
Web 2.0 increases probability of malware, inadvertent data leakage, but is important to next generation of employees entering the workforce.
-
ID Theft Protection will be provided to voters whose information was on laptops stolen from local Election Commission.
-
Keystroke logging software was installed in hotel business centers and Internet cafes around the world.
Most Read