The Obama administration will reportedly name a White House cybersecurity coordinator just in time for Christmas.
Ponemon Institute study details why.
Read more about that bill on the Hill.
Online criminals have taken advantage of the large social media following, exploiting users’ willingness to respond to messages that are supposedly from people they know and trust.
Military had warned of drone hacking in 2004
IDG says hackers can eavesdrop on GSM phone conversations
Expert says the federal government has a lot of clout that it’s not using. In its buying power, it needs to insist on safer software when they buy it … things can move in the right direction.
Learn more in today’s cybersecurity update.
Learn all about it in today’s cybersecurity update.