Cybersecurity
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
-
The move places the state among a growing group of governments using the shared authorization framework to reduce duplicative vendor security assessments. GovRAMP evolved from StateRAMP last year.
-
A faux-phishing email crafted by students at Eminence High School in Kentucky snagged 14 staffers at the district. Another in late January, created with help from generative AI, persuaded 29 staffers to click the link.
More Stories
-
Cyber criminals included legitimate URLs linking to official advice pages, as well as proper e-mail address for reporting abuse in fake e-mail.
-
Letter provides advice to protect against identity theft.
-
Banker Trojans are a very efficient tool for cyber crooks, since these malicious codes are designed to steal bank details and account numbers.
-
"Hired killer" threatens to stop only if victim wires a specified amount of money.
-
More attacks tailored to different cultures and technologies.
-
-
"New Hampshire and many other states across the nation have raised legitimate questions about privacy protection and the costs of Real ID. To date, the federal government has ignored those real problems and barreled ahead with Real ID."
-
Up to a million computers in 100 different countries allegedly infected by young hackers.
-
Vulnerabilities that were discovered with Ohio's voting systems, including touch-screen voting machines, resulted in the Ohio Secretary of State's Office recommending the state move to optical-scan paper ballots for the November election.
-
Upholds Jan. 2, 2008 directive requiring backup paper ballots by boards of elections using touch-screen (direct recording electronic-DRE) voting machines in the March 4 presidential primary election.
-
Thirty-six percent of data breaches resulted from lost and stolen laptops or other mobile devices.
-
In 2007, cash-motivated Web threats broadened; for 2008, the distinction between "good" and "bad" Web sites will be blurred when it comes to security.
-
"Identity theft continues to be a growing problem that affects more and more people every day and nearly a million people in this country have their identity stolen every year."
-
Governor Rell has introduced legislation that creates a new privacy protection statute that requires businesses, including banks, to take more measures to protect individual identities.
-
Results demonstrate positive impact of ITIL change, configuration and release processes on IT performance.
-
A growing number of school districts exploring biometric technology -- technology that scans the measurements and styles of a fingerprint, stores the print as a number and can be used to identify students when they get their medication in the nurse's office or go to a school dance.
-
Stolen credentials enable criminals to compromise servers and automatically inject crimeware to infect users visiting them.
-
"With several military bases, national science labs and major research universities, we believe that New Mexico is best equipped to host a new Air Force Cyberspace Command."