Cybersecurity
-
Internet services are still down at City Hall and other departments nearly a week after officials uncovered the attempted incident. Residents are unlikely to notice significant disruptions, officials said.
-
Some ways to master the essential tools to protect your privacy without sacrificing the convenience of modern smart technology.
-
The technology director of Goose Creek Consolidated Independent School District in Texas says AI will make phishing campaigns and deepfake videos more sophisticated, requiring more vigilance on the part of network users.
More Stories
-
The International Telecommunication Union and the European Commission have joined forces to mark Safer Internet Day.
-
"The government should not keep information confidential merely because public officials might be embarrassed by disclosure."
-
Cyber-criminals are using accounts that are likely stolen to post comments with links supposedly pointing to videos of celebrities such as Christian Bale, Megan Fox or Jessica Simpson.
-
"This white paper has been created specifically for CFOs that are weighing the potential benefits of new and emerging technology and looking for solutions that can save time, effort, resources, and, most importantly, lives."
-
"Our Privacy Office is viewed as a leader in the federal government in public outreach and as [a] model for privacy impact assessments."
-
Attorney General Abbott charges Edinburg Fitness Center with Identity Theft Prevention Act violations.
-
Harris County government telework supports continuity of operations.
-
Security, infrastructure, management and resources top federal CIO concerns.
-
"I have long stressed the importance of protecting the sensitive information that telecommunications carriers collect about their customers."
-
Two-thirds of U.S. consumers surveyed use the same one or two passwords for all Web sites.
-
Agencies must submit a report within 45 days to the Governor's General Counsel detailing what information can be posted online.
-
The Widespread Conficker worm has taken a new form and is infecting more machines.
-
"We must remain vigilant in the fight to protect our children online because child predators are constantly looking for their next victim."
-
Police officers use Blackberrys in Hawaii to access motor vehicle and criminal databases.
-
The Federal Trade Commission documented the most cases of identity theft ever in one year in the 2008 Fraud and Identity Theft Complaint Data.
-
Bowen will consider what action -- including possible withdrawal of state approval -- to take on the Premier GEMS voting system.
-
Government Technology's Top 25 public-sector innovators for 2009.
-
The requirement if enacted, would cost around $20 million to fit 10,000 voting machines with printers.