-
NC prohibits agencies from paying ransoms
April 08, 2022 | News, CybersecurityState and local government agencies in North Carolina may not submit payments to -- or even communicate with -- someone who has encrypted their IT systems. Other states are considering similar legislation.
-
Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networks
| News, CybersecurityHackers with open source intelligence gathering tools can mine a target’s audio and video to extract personal information they then use in phishing messages that appear to come from a trusted source.
-
How QR codes work and what makes them dangerous – a computer scientist explains
| News, CybersecurityJust as it can be hazardous to click links in emails, visiting URLs stored in QR codes can also be risky.
-
Thieves hit on a new scam: Synthetic identity fraud
April 07, 2022 | News, CybersecurityCombining real Social Security numbers with mismatched or phony names to create new synthetic identities allowed swindlers to bilk the federal government out of nearly $1 million from the Paycheck Protection Program.
-
Zero-trust architecture demands a new view on data security
| News, CybersecurityState and local government agencies can meet today’s expanded threat landscape with zero trust’s simplified access control enforcement and continuous validation and authentication.
-
How Ukraine has defended itself against cyberattacks – lessons for the US
April 06, 2022 | News, CybersecurityAuthenticating logins, backing up critical data and patching software vulnerabilities will help protect critical infrastructure from malicious foreign actors.
-
Compromised email behind fake emergency data requests
April 04, 2022 | News, CybersecurityEmails that look like they’re coming from law enforcement agencies have mobile providers, ISPs and social media companies turning sensitive data over to hackers.
-
States unclear on what constitutes ‘reasonable’ cybersecurity
| News, CybersecurityConfusion about cyber insurance, incident response, multifactor authentication and cyber hygiene training is widening a gap between acknowledging risk and managing it.
-
Ransomware tests local governments
| News, CybersecurityMalicious actors increasingly target smaller governments that lack sufficient cyber defenses, risking the operation of critical public services.
-
Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasons
| News, CybersecurityCyber operations have become an integral part of military campaigns, and Russia is targeting Ukraine's networks and infrastructure with disinformation campaigns on social media sites.