Cybersecurity
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
More Stories
-
"Americans' electronic health records could be shared -- without their consent -- with over 600,000 covered entities through the forthcoming nationally linked electronic health-records network."
-
Affected properties include hotels and suites, budget motels, airport hotels, luxury hotels, resorts, and casinos.
-
"Consumers own their electronic medical data and should have the right to easily access their information and control who gets to see it."
-
WatchGuard announces five trends that are sure to change the online world in 2009.
-
Many respondents were unaware of the tracking, collecting and sharing of information that occurs as a result of online activities.
-
Someone broke the locks, got through the password, reprogrammed the signs and then changed the passwords.
-
FCC Chairman Kevin Martin said Comcast's network management amounted to "looking inside its subscribers' communications, blocking that communication when it uses a particular application regardless of whether there is congestion on the network, hiding what it is doing by making consumers think the problem is their own, and lying about it to the public."
-
Make vendors responsible for vulnerable software, says Alan Paller, director of research for the SANS Institute.
-
The Monster database used by USAJOBS has recently become the target of attempts to illegally access sensitive information.
-
Social networking becomes more prevalent at work.
-
New cases of 'swatting' are occurring more frequently, leaving law enforcement few leads.
-
In the past, third-party software that has been downloaded and has destroyed some devices to the point where the device was not repairable and had to be replaced.
-
Work-at-home schemes attract otherwise innocent individuals, causing them to become part of criminal schemes without realizing they are engaging in illegal behavior.
-
"The agency should simplify and clarify the criteria for making decisions about waiving requirements to obtain permission from every patient whose personal health information will be used in study."
-
President Obama recruits an aide from the Bush administration to head up his own cyber-security activities.
-
More patients will withhold private information as they lose trust in the confidential doctor-patient relationship and lose control over the widespread disclosure of their most personal information.
-
Telemarketing schemes can be tempting for Missouri's farmers and consumers especially during hard economic times.
-
'Chuck Norris for President' touted on tampered electronic message board.