Cybersecurity
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
More Stories
-
Consumer Report warns against the most common mistakes that can cause data loss and identity theft.
-
"That court opinion ... threatens to wholly eviscerate federal privacy protections against Internet wiretapping."
-
-
"With the cooperation of our law enforcement partners around the world, we can identify, charge and apprehend even the most sophisticated international computer hackers."
-
With the volume and potential impact of Internet threats consistently increasing, the state's e-mail systems must balance the need for strong security controls with the business requirements of state government.
-
Public CIOs analyze the benefits and risks of cloud computing.
-
"I am particularly pleased to know that the people of Clark County will be able to access their family's history and genealogy."
-
To study the different voting systems used throughout Colorado and suggest changes to the Legislature.
-
Deadline 5 p.m. (EST) on Wednesday, September 10th.
-
"In New York and Washington, attorneys general have equipped themselves to take on Internet fraud and abuse ... Other state attorneys general should follow their lead and provide online consumers the protection they deserve."
-
Texas debit card users should be vigilant and avoid this new twist on old e-mail scheme.
-
Taxes, intellectual property and Internet connectivity addressed.
-
"State information technology best practices should be promoted and shared."
-
Growing use of virtual tools creates more infrastructure for agencies to manage and secure.
-
All-hazards focus by fusion centers improves emergency operations.
-
Consolidates public programs and protects patient privacy.
-
Security best practices cannot be adequately documented or enforced when machines are transported and stored in poll worker's homes, work places or automobiles.
-
If convicted, hacker faces a maximum penalty of five years in prison and up to three years of supervised release.