-
The incident is affecting the towns of Pepperell, Dunstable, Townsend and Ashby. It has taken down emergency and business phone lines for police, fire, and emergency medical services departments, but not 911.
-
Steve Patterson brings decades of in-house experience at the Department of Information Technology Services to his new position. There, he’ll guide tech operations and ongoing modernization.
-
Town officials are investigating the incident, which has impacted computer systems and public safety departments. Its 911 phones are working normally and no private data appears to have been compromised.
More Stories
-
Michael Simeone joins the city from Bendett & McHugh, P.C., where he was CIO for nearly nine years. The new chief technology officer will help guide and align tech work and strategy for New Haven and its board of education.
-
Sinclair Community College and the online learning company D2L have launched a free, self-paced cybersecurity course, expected to take one or two hours, to help local K-12 administrators stay ahead of cyber threats.
-
Cybersecurity experts from state and local government, as well as top federal agencies, gathered this week to discuss everything from critical infrastructure attacks to concerns about China. Here are some top takeaways.
-
The Tarrant Appraisal District’s site was down for a few hours Thursday and officials are assessing the issue with cybersecurity experts. No sensitive data is believed to have been affected.
-
Developed by state agencies, the regulations are intended to assist entities and vendor partners on incidental and intentional GenAI procurements. Their release follows considerable state explorations in generative AI.
-
In the face of concerns like AI-powered phishing, tensions around discussing misinformation and physical threats, election workers can turn to several organizations aimed at providing them with help.
-
A ransomware attack discovered in early February locked public defenders across the state out of their computers and files. The Office of the Colorado State Public Defender has acknowledged personal data may have been stolen.
-
Cyber criminals are likely to soon target file transfer services, try to compromise the software supply chain and launch novel phishing strategies, according to a new report from Recorded Future.
-
Pending approval by the its board of trustees, the University of South Florida plans to enlist existing faculty to lead new undergraduate and graduate programs, certifications and continuing education options.
-
A partnership between Chicago Public Schools, the Illinois Institute of Technology and City Colleges of Chicago allows high-school juniors and seniors to enroll in college courses in pursuit of associates degrees.
-
Lewis and Clark County commissioners have approved seeking a federal grant to replace courthouse cameras not compliant with the National Defense Authorization Act. The devices are considered susceptible to online attacks.
-
Everyday household items like remote thermostats may be vulnerable to hackers, but a new federal program hopes to identify and label which connected products are taking measures to protect your information.
-
In the midst of an election year, evolving AI has in part led to a massive spike in deepfake-powered disinformation, but at a recent Brookings event, experts discussed how lawmakers and officials can play defense.
-
While new artificial intelligence technologies could be used for nefarious purposes such as creating more convincing phishing attacks, experts say the technology might also automate and strengthen IT security protocols.
-
Concerned about foreign spying and hacking, legislators are considering a bill that would ban public agencies in Connecticut from buying “any small unmanned aircraft system assembled or manufactured” in China or Russia.
-
Four months after a similar ballot measure narrowly failed, Duluth School District is asking voters to approve $5.2 million in taxes annually over 10 years for technology, cybersecurity and learning.
-
In this interview with white hat hacker Mishaal Khan, we learn about open source intelligence gathering and how to hack humans — or not.
-
This type of attack involves using face-swapped videos to try to trick online verification systems, but as they rise in prevalence, so too do methods for combating them.