SECURITY NEWS

Girl Scouts Look To Boost Interest in IT Careers With New Cybersecurity Badges

06/20/2017

To inspire a familiarity and interest in cybersecurity among girls, the Girl Scouts of the USA partnered with Palo Alto Networks to create 18 new cybersecurity badges.

How WannaCry Survives

06/16/2017

The ISMG Security Report leads with testimony from the CEO of the company that crippled WannaCry's ransomware component who explains to Congress how the worm continues to attack unpatched systems at increasing rates.

How to Stop and Remediate WannaCry

05/18/2017

The effects of WannaCry, the ransomware dominating international headlines, continue to be felt by organizations and individuals alike. If you or anyone you know has had a device infected, (ISC)2 has advice for stopping and remediating the attack.

AN ACT TO AMEND TITLE 6 OF THE DELAWARE CODE RELATING TO BREACHES OF SECURITY INVOLVING PERSONAL INFORMATION.

05/16/2017

This Act amends Chapter 12B of Title 6 to update Delaware's law regarding computer security breaches. This Act makes technical corrections to conform to the standards of the Delaware Legislative Drafting Manual, including the use of the term "person" to mean both an individual and an artificial entity.

In Computer Attacks, Clues Point to Frequent Culprit: North Korea

05/15/2017

SAN FRANCISCO — Intelligence officials and private security experts say that new digital clues point to North Korean-linked hackers as likely suspects in the sweeping ransomware attacks that have crippled computer systems around the world.

WannaCry: Everything You Need To Know About the Ransomware Sweeping the Globe

05/14/2017

A massive cyberattack has been spreading across the globe since Friday, May 12, 2017, hitting hundred of thousands of computers and crippling major government and corporate operations. The malware is known as WannaCry, and here's what you need to know.

Alert (TA17-132A) Indicators Associated With WannaCry Ransomware

05/12/2017

The latest version of this ransomware variant, known as WannaCry, WCry, or Wanna Decryptor, was discovered the morning of May 12, 2017, by an independent security researcher and has spread rapidly over several hours, with initial reports beginning around 4:00 AM EDT, May 12, 2017. Open-source reporting indicates a requested ransom of .1781 bitcoins, roughly $300 U.S.

More than 300 girls celebrated DigiGirlz

05/04/2017

“Find your passion and figure out how to turn it into a career. Then work won’t seem like work,” State Cyber Security Officer Elayne Starkey encouraged the nearly 300 teen girls who attended DigiGirlz Day Tuesday.

Netflix Episodes Posted After Hackers Demand Ransom

05/01/2017

Alleged ‘Orange Is the New Black’ Episodes Posted After Hackers Demand Ransom. Fans of the Netflix prison drama "Orange Is the New Black" face a dilemma after hackers claimed to have leaked most of the new season's 13 episodes this weekend — wait more than a month for the official release date or give in and download the pirated shows.

Ransomware became three times more expensive in 2016

04/27/2017

In 2015, the average profit for a cyber thief through ransomware was $294. Symantec found in its Internet Security Threat Report that demands have more than tripled, jumping up 266 percent to an average $1,077 per victim. Depending on how important the files are, it might be cheaper to just buy a new computer.

Is apple.com really apple.com? The answer: Maybe.

04/21/2017

People are being warned about an old phishing technique capable of duping even the most clued-up internet users. The attack exploits the fact that lots of different characters look identical.

Attack Sets off 156 Emergency Alarm Sirens in Dallas

04/13/2017

An attack set off all the emergency sirens in Dallas, Texas, for a spell of around 90 minutes on Friday night. As reported by Reuters, the attack successfully triggered 156 sirens, normally used to warn of dangerous weather conditions such as tornadoes, at 11.42 p.m. CDT. It took engineers until 1:17 a.m. on Saturday to manually shut down the sirens’ radio system and repeaters.

These Hackers Want To Do Your Taxes, And Take Your Refund Too

04/11/2017

The tax deadline this year is April 18, but thieves looking to steal tax returns likely started as early as January, sending about 300 to 1,000 scams a week. If they don't file a fraudulent tax return before the real person does, the thief simply moves on to the next victim.

Calling All Women: The Cybersecurity Field Needs You And There's A Million Jobs Waiting

04/03/2017

Cybersecurity has a gender problem: Only 11% of the world's information security workforce are women, according to the Women's Society of Cyberjutsu (WSC) -- a 501(c)3 non-profit passionate about helping and empowering women to succeed in the Cybersecurity field.

Feds Pull FAFSA Tool After Potential Data Breach

03/30/2017

Families applying for federal student aid are facing extra hurdles this year after a potential data breach led federal officials to remove an online tool that smoothed the process. The Education Department and the Internal Revenue Service said Thursday that an online service known as the Data Retrieval Tool will stay offline for the rest of this application season. In the past, families could use the tool to import their tax information automatically to the Free Application for Federal Student Aid, a complex form needed to get federal aid.

If Your iPhone is Stolen, These Guys May Try to iPhish You

03/14/2017

KrebsOnSecurity recently featured the story of a Brazilian man who was peppered with phishing attacks trying to steal his Apple iCloud username and password after his wife’s phone was stolen in a brazen daylight mugging. Today, we’ll take an insider’s look at an Apple iCloud phishing gang that appears to work quite closely with organized crime rings — within the United States and beyond — to remotely unlock and erase stolen Apple devices.

Tech Roundup

03/08/2017

On Tuesday, WikiLeaks released a huge cache of documents that detail how the C.I.A. has collected various types of cyberweapons, including so-called zero-day vulnerabilities that would expose iPhones, Android phones, Windows and Linux computers, internet-connected televisions and maybe even high-tech cars to hackers.

Breaches Affecting 500 or More Individuals

02/17/2017

U.S. Department of Health and Human Services, as required by section 13402(e)(4) of the HITECH Act, the Secretary must post a list of breaches of unsecured protected health information affecting 500 or more individuals. These breaches are now posted in a new, more accessible format that allows users to search and sort the posted breaches. Additionally, this new format includes brief summaries of the breach cases that OCR has investigated and closed, as well as the names of private practice providers who have reported breaches of unsecured protected health information to the Secretary.

Here Is How to Fend Off a Hijacking of Home Devices

02/01/2017

MODERN homes today are getting internet-connected light bulbs, thermostats, TVs and speakers. So with a simple voice command or the touch of a button on our smartphones, we can set the temperature, turn on a light or prepare the TV to record a program. What could go wrong?

IRS to Delay Tax Refunds as a Security Precaution

01/23/2017

Refunds for more than 40 million low-income families could be delayed by the IRS this year, as the tax agency looks to leverage the extra time to combat identity theft and fraud.

19,000 Delaware Blue Cross Blue Shield members' data breached

01/13/2017

Two subcontractors of Highmark Blue Cross Blue Shield of Delaware were breached in an incident that has compromised 16 of the insurer's self-insured customers and about 19,000 of their members.

Hackers and passwords: Your guide to data breaches

12/21/2016

Oh great, another data breach. That’s what you’re likely to think when a yet another company or organization that had your personal information tells you it’s been hacked. Whether it’s Yahoo, Ashley Madison or the U.S. Office of Personnel Management you’re hearing from, these notifications are often filled with technical terms and legalistic phrasing.

Yahoo Says 1 Billion User Accounts Were Hacked

12/14/2016

SAN FRANCISCO — Yahoo, already reeling from its September disclosure that 500 million user accounts had been hacked in 2014, disclosed Wednesday that a different attack in 2013 compromised more than 1 billion accounts

91% Of Cyberattacks Start With A Phishing Email

12/13/2016

Phishing remains the number one attack vector, according to a new study that analyzes why users fall for these lures.

Senate and House Leaders Call for Inquiry of Russian Hacking in Election

12/12/2016

WASHINGTON — The top two Republicans in Congress said on Monday that they supported investigations into possible Russian cyberattacks to influence the American election. “Any foreign breach of our cybersecurity measures is disturbing, and I strongly condemn any such efforts,” said Senator Mitch McConnell, Republican of Kentucky and the majority leader, adding, “The Russians are not our friends.”

5 State and Local CISOs Who Are Keeping Watch on Cybersecurity Issues

12/01/2016

Meet a few of the many IT security leaders at the state, county and city levels who work hard to keep citizen and government data safe.

2017 State CIO Priorities Reflect Importance of Security and Strategic Enterprise Thinking

11/17/2016

This year, the State CIO Top Ten shows information technology (IT) security strategies and tools are at the top of the list across the states, with security topping the list of priority strategies for the third consecutive year. Cloud services and consolidation/optimization remain at the top as second and third rated priorities.

Regulate Cybersecurity or Expect a Disaster, Experts Warn Congress

11/16/2016

The U.S. government must demand that all internet-connected devices have built-in security, according to experts who warned Congress that the country could soon face a disastrous, lethal cyberattack.

Homeland Security Chief Discusses Cybersecurity at DSU

11/07/2016

Gov. Jack Markell is joining the head of the federal Department of Homeland Security for a discussion about cybersecurity.

NIST out with Cyber Workforce ‘Dictionary’

11/03/2016

Federal scientists Wednesday published a draft “dictionary” aiming to help businesses figure out whom they should hire, with the guide describing every kind of cybersecurity job and cataloging the knowledge and skills needed to do them well.

FCC Approves Broadband Privacy Rules to Protect Consumers

10/27/2016

The Federal Communications Commission (FCC) has voted to approve new broadband privacy rules that will give consumers greater control over how their personal information is collected and shared by internet service providers (ISPs). But consumers won't see the changes right away.

Cybersecurity is the new plastics

10/19/2016

Though it dates me, I smile over the line in the classic movie "The Graduate," where a young Dustin Hoffman is counseled to consider what "plastics" could mean to his future.

Officials Talk Cyber Security at Lewes Public Library

10/13/2016

(LEWES, Del.) - Officials from Delaware State Department of Technology and Information presented cyber security tips at the Lewes Public Library in Sussex County.

U.S. CISO Wants to Lean on Freelance Hackers to Improve .gov Security

10/11/2016

The U.S.’ first Chief Information Security Officer outlined Tuesday a series of strategic plans he hopes to execute during his tenure including the possible expansion of a massive bug bounty program across all .gov domains.

Want a sure-fire well-paid job? Train to fight computer hackers.

10/07/2016

Try the booming field of cybersecurity. Companies can’t hire fast enough. In the United States, companies report 209,000 cybersecurity jobs that are in need of filling.

NSA Contractor Arrested; Charged With Stealing Top Secret Info

10/05/2016

The FBI secretly arrested a Booz Allen Hamilton contractor in August on suspicion of stealing hacking tools used by the National Security Agency to break into foreign governments’ computer networks, according to federal prosecutors.

The Internet Is Breaking. Here’s How To Save It

10/03/2016

This Internet has driven the greatest expansion of the global economy since the Industrial Revolution. The promise of information technology is extraordinary. But it is still a promise, and it’s one people are starting to question. The NTIA recently announced that fully half of all Americans are actually backing away from the Internet due to security and privacy fears.

NIST Launches Self-Assessment Tool for Cybersecurity

09/22/2016

The draft tool was released Sept. 15 at the Internet Security Alliance’s annual conference in Washington, D.C. by Deputy Secretary of Commerce Bruce Andrews.

500 Million Yahoo Accounts Breached

09/22/2016

SAN FRANCISCO — Information from at least 500 million Yahoo accounts was stolen from the company in 2014, and the company said Thursday it believes that a state-sponsored actor was behind the hack.

The remarkable roots of Security BSides Delaware, the First State’s Cyber Gem.

09/19/2016

Cybersecurity has been a hot button issue for the First State, which is why events such as Security BSides are so important to us right now. Last year, the event took place during Delaware Innovation Week. This year, it will be a standalone event on the weekend of Oct. 7 at Wilmington University.

Cyber Bullying: Whose Domain Is It Anyway?

09/06/2016

School officials and the attorney general are taking tough actions against online bullies. But they say that parents need to teach—and monitor—their kids.

Inside the FBI: Director Comey Addresses Cyber Security Experts

09/02/2016

FBI Director James Comey presented the morning government keynote address to cyber security experts at the Symantec Government Symposium in Washington, D.C. on August 30, 2016

A Hacker's Best Friend is a Nice Employee

08/15/2016

LAS VEGAS — When it comes to hacking, the most dangerous thing at most companies may not be their computer network but the lowly desk telephone. “You can get everything you need — information about their security, their operating system, what kind of computers they use. Just with a call,” said Chris Silvers.

Why the White House's Cyber Commission is Asking the Public for Advice

08/09/2016

The White House’s Commission on Enhancing National Cybersecurity is launching a public plea for help Wednesday in understanding the “current and future states of cybersecurity in the digital economy.” "The commission will make detailed recommendations to strengthen cybersecurity in both the public and private sectors,” the notice reads​.

In a Major Cyber-hack, Whom Do You Call? The White House Spells it Out

07/26/2016

NEW YORK — President Obama approved a new directive Tuesday that spells out for the first time in writing how the government handles significant cyber-incidents. The directive lets the public know which agency handles what, answering an oft-heard question after a breach: Whom do I call for help?

MS-ISAC official: Ransomware is Top Malware of Concern for States, Counties

07/21/2016

Government IT systems are under rising attack from ransomware threats, security experts told executives at the National Association of Counties conference.

Delaware Cyber Challenge tests skills of computer ‘whiz kids’

07/15/2016

DOVER –– The seventh Delaware-hosted U.S. Cyber Challenge drew 50 participants to Delaware State University last week ranging in age from 16 to 50 –– all looking to improve their skills in cyber security. “It’s really about sharpening your computer skills,” said John Foss, 48, of Dover. “You may be at home thinking you’re really skilled with computers, but you come here and see there is so much you don’t know yet.”

Cybersecurity Boot Camp Looks to help Build Workforce for Growing Field

07/15/2016

This week’s cybersecurity boot camp at DSU is a partnership with the U.S. Cyber Challenge. Marwan Rasamny, chair of DSU’s computer information science department, said these camps are needed to help participants keep up with the ever-changing tech landscape.

U.S. Cyber Challenge and DE Universities Hosting Annual Cybersecurity Boot Camp & Competition this week in Dover

07/11/2016

For four days, participants will develop their cybersecurity skills through intensive classroom instruction by industry experts. On the final day, campers will compete in a cyber-attack and defense competition.

Cybersecurity Boot Camp

07/10/2016

For four days, participants will develop their cybersecurity skills through intensive classroom instruction. Curriculum at the Delaware camp will include in-depth workshops on a range of topics including packet crafting and pen testing, all taught by college faculty, SANS Institute senior instructors and other cybersecurity experts.

U.S. Cyber Challenge and Delaware Universities to Host Annual Cybersecurity Boot Camp & Competition

07/6/2016

Arlington, VA, July 6, 2016 – Next week, U.S. Cyber Challenge (USCC) will host the 7th annual State of Delaware Summer Cyber Camp program in collaboration with the University of Delaware, Delaware State University, Wilmington University, Delaware Technical Community College (Delaware Tech) and the Delaware Department of Technology and Information (DTI) from July 11-15, 2016.

Hackers discover more than 100 vulnerabilities in Pentagon websites

06/18/2016

WASHINGTON – High-tech hackers brought in by the Pentagon to breach Defense Department websites were able to burrow in and find 138 different security gaps, Defense Secretary Ash Carter said Friday.

Phone Scam ‘Onslaught’ Has Authorities Scrambling

05/27/2016

Authorities are fighting a scourge of phone crime enabled by cheap technology that blasts out nefarious calls and hides wrongdoers’ whereabouts. The scammers are heavily targeting the elderly, sparking a push in Congress to fight back.

Delaware Students Look at Tech Careers

05/03/2016

DigiGirlz Day: In New Castle County Delaware, 150 young girls got an inside look at careers in technology.

Incidents of Ransomware on the Rise

04/29/2016

Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the entities impacted recently by ransomware, an insidious type of malware that encrypts, or locks, valuable digital files and demands a ransom to release them.

Wireless Keystroke Logger Disguised as USB Device Charger Targets Wireless Keyboards

04/29/2016

KeySweeper is a covert device that resembles a functional Universal Serial Bus (USB) enabled device charger which conceals hardware capable of harvesting keystrokes from certain wireless keyboards.

7 Ways to Protect Yourself From Credit Card Fraud at Gas Stations

04/28/2016

Consumers typically worry about credit card fraud when making purchases online or conducting ATM transactions, but over the past few years, fraudulent credit card activity has taken the form of gas station scams that use technology to victimize patrons. The key to staying safe is understanding how to protect yourself from identity theft and credit card fraud.

Preview: Hacking Your Phone

04/15/2016

Everything is hackable, especially your cellphone, as Sharyn Alfonsi finds out with demonstrations from professional hackers who act as security consultants. Alfonsi reports on Sunday.

Walmart Mystery Shopper Scam Resurfaces

04/11/2016

A mystery shopper scam targeting Walmart customers, which has been around since at least 2011, has resurfaced. Reports of the scam have started circulating on Facebook and other parts of the Web, from people who have gotten checks of up to $2,000 in the mail.

FBI May Have Put Down Sword, but Privacy Debate Goes On

04/06/2016

The immediate fight between Apple and the Federal Bureau of Investigation over opening a locked iPhone used by one of the attackers in last year’s San Bernardino, Calif., rampage is over. But the effects of the case linger.

FBI wants U.S. Businesses to Help as Cyber Extortion Gains Urgency

03/29/2016

The FBI is asking businesses and software security experts for emergency assistance in its investigation into a pernicious new type of "ransomware" virus used by hackers for extortion.

Spear phishing data breach hits SevOne

03/09/2016

SevOne fell victim to a cybersecurity attack that has put current and former employees at risk for identity fraud. The tech company has confirmed it released W-2 wage and tax data to an unauthorized recipient outside the company. That information is believed to include Social Security numbers, home addresses, dates of birth and other personal information criminals can use to file false tax returns and commit other forms of identity theft.

Padua 'Cyber Patriots' Take State Title

03/09/2016

For the third straight year, students at Padua Academy won the state's Cyber Patriot competition which test youths abilities to find an eliminate malware from computers.

Four Cybersecurity Events Planned Throughout Delaware

03/02/2016

Viruses, worms, Trojan horses and even ransomware: Online attacks pose a serious threat to major corporations, small businesses, nonprofits and individuals. Cyber attacks cause an estimated $400 billion a year in damages and lingering disruptions....

Grant to help Del Tech Expand IT Training Efforts

02/28/2016

Delaware Tech has received a grant to expand training opportunities for those interested in pursuing careers in IT.

Beware downloading some apps or risk "being spied on"

02/24/2016

Popular apps on your smartphone can be convenient and fun, but some also carry malicious software known as malware, which gives hackers easy access to your personal information.

Obama’s Last Budget, and Last Budget Battle with Congress

02/09/2016

President Obama on Tuesday sent his final annual budget proposal to a hostile Republican-led Congress, seeking $19 billion for a broad new cybersecurity initiative and rejecting the lame-duck label as he declared that his plan “is about looking forward.”

N.J. Health Care Cyber Groups Strike Information Sharing Deal

02/08/2016

The National Healthcare Information Sharing and Analysis Center, known as NH-ISAC, is teaming up with the New Jersey Cybersecurity and Communications Integration Cell, a state fusion center aimed at encouraging cooperation on cyber issues among all levels of government and the private sector. Under the new agreement, announced late last month, the two centers will begin sharing data on possible threats their systems detect, as well as analyses on the significance of that data.

Cybersecurity nonprofit addresses 2016 threats for states, localities

01/04/2016

As 2016 opens, Thomas Duffy, chair of the Multi-State Information Sharing and Analysis Center that’s run by the nonprofit, walked StateScoop through the threats he’s hoping to prepare government IT workers to face over the coming months.

Virginia gov. plans nearly $22M in cyber investments through 2018

12/18/2015

Virginia Gov. Terry McAuliffe is hoping to make a sizable investment in cybersecurity over the next two years, including nearly $22 million in planned investments in cyber programs in his new biennial budget proposal.

House passes bill authorizing Secret Service cybercrime training for state, local cops, prosecutors.

12/01/2015

The House has passed a bill to authorize the Secret Service to provide training to state and local officials to help them better combat cybercrime.

The Serial Swatter

11/24/2015

Internet trolls have learned to exploit our over-militarized police. It's a crime that's hard to stop — and hard to prosecute. Janet was sleeping fitfully in her parents’ home in Toronto. She had gone home for the weekend in a state of nervous collapse. For months, someone going by the name ‘‘Obnoxious’’ had been harassing her online.

Delaware convenes new cybersecurity advisory council

11/03/2015

Delaware Gov. Jack Markell is taking new steps to promote cooperation on cybersecurity initiatives among the state’s agencies and between the public and private sectors. Chief Information Officer James Collins will lead the new group of government and business leaders as they work to bolster the security of the state's infrastructure and share information about cyberthreats.

Governor Markell pays tribute to Neela Moody, National Winner of the K-12 Computer Safety Poster Contest

10/28/2015

Announcing the Executive Order in his legislative hall office today, the Governor also presented a tribute to Gallaher Elementary fifth grade student Neela Moody as the national winner of the K-12 Computer Safety Poster Contest, with her submission finishing first among more than 600 entries.

Governor Markell establishes cyber security council, Executive Order 55

10/28/2015

Dover, DE – Recognizing the ever-increasing need to strengthen online safety and security in a society that relies heavily on the internet, Governor Markell today signed Executive Order 55, establishing the Delaware Cyber Security Advisory Council.

Governor Jack A. Markell's Weekly Message: "Protecting Our Economy by Promoting Online Safety"

10/16/2015

Governor Markell explains the importance of internet safety and security as Delaware recognizes October as Cyber Security Awareness Month.

Governor Jack Markell Proclaims October 2015 Cyber Security Awareness Month

10/06/2015

Governor Markell signed a formal proclamation signifying that Delaware is joining a growing global effort among colleges, universities, businesses, government agencies, associations, nonprofit organizations, and individuals to promote online safety awareness.

Intelligence Start-Up Goes Behind Enemy Lines to Get Ahead of Hackers

09/13/2015

CHANTILLY, Va. — On a recent Wednesday morning, 100 intelligence analysts crammed into a nondescript conference room here and dialed into a group call with 100 counterparts in Argentina, Brazil, Cyprus, India, the Netherlands, Romania, Spain, Taiwan and Ukraine. As they worked their way around the room, the analysts briefed one another on the latest developments in the “dark web.”

Maryland school district uses texting service to cut down on bullying

09/01/2015

Queen Anne's County Public Schools uses a service called Text 2 Stop It!, which has partnered with a government IT solutions provider to make its services available to the public sector.

Delaware moves to protect student data

08/12/2015

Delaware and other states are working to make sure the information they keep about students is kept safe and private as computers become more prominent in classrooms – and educators lean more on scores and data in teaching.

Senate Bill Aims To Lock Hackers Out Of Connected Cars

07/21/2015

The road to our connected future may be paved with good intentions, but it may not be secure enough to drive on.

Counties rally around collaboration through cybersecurity

07/16/2015

CHARLOTTE, N.C. — In an era of highly-publicized breaches of personally identifiable information, technology officials at all levels of government are looking to find ways to best protect the data on their networks.

Unprecedented Verdict in Delaware Cyberstalking Case

07/10/2015

A federal jury in Wilmington, Delaware, has convicted three family members of a courthouse shooter of cyberstalking causing death.

Hacking of Government Computers Exposed 21.5 Million People

07/10/2015

WASHINGTON — The Obama administration on Thursday revealed that 21.5 million people were swept up in a colossal breach of government computer systems that was far more damaging than initially thought, resulting in the theft of a vast trove of personal information, including Social Security numbers and some fingerprints.

Security Experts Oppose Government Access to Encrypted Communication

07/07/2015

SAN FRANCISCO — An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world's most confidential data and critical infrastructure in danger.

Cardinals Investigated for Hacking Into Astros' Database

06/16/2015

WASHINGTON — Front-office personnel for the St. Louis Cardinals, one of the most successful teams in baseball over the past two decades, are under investigation by the F.B.I. and Justice Department prosecutors, accused of hacking into an internal network of the Houston Astros to steal closely guarded information about players.

6 Chinese Men Indicted in Theft of Code From U.S. Tech Companies

05/19/2015

WASHINGTON — The Obama administration on Tuesday announced the arrest of a Chinese professor and the indictment of five other Chinese citizens in what it contended was a decade-long scheme to steal microelectronics designs from American companies on behalf of the Chinese government.

How to Protect Yourself Against 'Free WiFi' Scams

03/19/2015

Security experts warn that cyber criminals are setting up fake WiFi hotspots, luring consumers to hand over the keys to their computers.

Obama Unveils Cyber Training Innitiative

03/10/2015

Program Aims to Bolster Nation's High-Tech Workforce

2014 Cyber Security Poster Contest Winners

03/03/15

Narae Y. from Gallagher Elementary School, Alaina R. from All Saints Catholic School, and Neela M. from Gallagher Elementary School.

HP Predicts Major Cyberattack in Next Five years

02/18/2015

"We expect an attack that will cause significant and lasting damage to a major world economy through physical and economic impacts," he told the European Information Security Summit 2015 in London.

Online Bank Robbers Steal Up to $1 Billion, Kaspersky Says

02/16/2015

A hacker group has stolen as much as $1 billion from banks and other financial companies worldwide since 2013 in an "unprecedented cyber-robbery," according to computer security firm Kaspersky Lab.

Congress, '60 Minutes' Exaggerate Threat Of Car Hacking

02/09/2015

The connected car is under attack. Not from hackers, just yet. But from the media and policymakers at the moment.