Cybersecurity
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
-
Some school district IT teams have been experimenting with using generative AI tools for cybersecurity, for example to analyze data logs on help desk tickets to improve incident response plans, or to troubleshoot code.
-
The incident, described as an “attempted interruption,” prompted staffers to work manually, and led to the cancellation of a City Council meeting. Water, sewer and tax payments are also disrupted.
More Stories
-
Trojan program downloaded spyware, adware, porno pop-ups to consumers' computers.
-
In response to vulnerabilities brought to light late last year through Ohio's top-to-bottom voting machine review, Project EVEREST (Evaluation and Validation of Election Related Equipment, Standards and Testing).
-
Being used to distribute keylogger Trojan.
-
Cyber Storm, the Department of Homeland Security's biennial exercise series, provides the framework for the nation's largest cyber security exercise.
-
Online Child Safety Act builds closes a loophole so that sex offenders using Web cams can be held accountable.
-
-
"An interactive service provider shall establish, maintain and enforce a policy to require information content providers to be conspicuously identified with all information provided by, at a minimum, their registered legal name.
-
CyberTipline serves as the nation's online "911" for reporting suspected sexual exploitation crimes against children.
-
Councilmembers join celebrities, LAPD and LA County Sheriffs to promote Internet safety.
-
Just like oncoming traffic, there are many dangerous things out there on the net that can hurt kids.
-
Seven flaws discovered in both Mac and Windows versions of Microsoft Office.
-
From Friday to Sunday, undercover agents had been communicating on the Internet with child sexual predators, informing them of their location, a specially prepared decoy home.
-
Nearly 6,000 state laptops encrypted, continued vigilance urged to safeguard data.
-
Report includes tactics used by Internet predators to target children, warning signs that children may be at risk online, a guide to commonly used chat abbreviations and cyberstalking and online harassment.
-
The ID Theft Unit will actively investigate alleged fraud and provide hands-on assistance to consumers, expertise and resources to local law enforcement and prosecutors.
-
"This bill will protect victims of identity theft through better notification procedures, stronger legal options and better oversight from businesses."
-
"By working so closely with the public, government officials and members of the media, we are developing a detailed record of how the Freedom of Information Act and the Open Meetings Act are working."
-
Fake, personalized links sent as Google Calendar meeting invitations.
Most Read
- Signal Priority Improves the Bus Ride in San Jose, Calif.
- High School Tech Director Advises Ed-Tech Skepticism, Intentionality
- Mississippi AI Innovation Hub’s New Chatbot Targets Procurement
- Cleveland Looks to Accela Permit Tech to Boost Development
- Texas Could Pass Virginia as World’s Top Data Center Market