Advanced Computing in the Age of AI | Friday, March 29, 2024

cybersecurity

Hackers Carjack Jeep in IoT Nightmare

Two hackers successfully took control of a Jeep Cherokee as it hurtled along a highway at 70 miles per hour, turning an Internet of Things nightmare into reality – ...Full Article

Are Breaches Killing Flash?

Mozilla added the Flash Player Plugin to its roster of blocked add-ons, after yet another security alert from developer Adobe and following a public call for the end of ...Full Article

How to Protect Your Data from Third-Party Breaches

The December 2013 Target data breach that compromised the credit card information of 40 million customers was the first of many wake-up calls to organizations, bringing home the damage ...Full Article

The Day the Networks Died: Attack or Glitch for NYSE, United?

The New York Stock Exchange (NYSE) resumed trading at 3:13 pm EST today, after an "internal technical issue" suspended operations for almost four hours. Only three days after HackingTeam ...Full Article

Manta Beats Bots with Automated Protection

As a destination site where about 30 million small and midsize companies market themselves to each other and consumers, Manta is attractive to another form of traffic: web scrapers ...Full Article

Slam the Door Against Insider Threats

When a banker falls behind on the mortgage, a physician gets arrested for driving under the influence, or a contractor is working on a sensitive federal construction site under ...Full Article

To Improve Cybersecurity, Fire Some CEOs

Despite the amazing number of cybersecurity breaches, so far the Target CEO appears to have been the only one to pay the price. While we hear some calls for ...Full Article

RAND Corp: Manage Security Like a Business

Organizations must figure out a better way to manage cybersecurity like a business, using metrics to determine the relative return on investment (RROI), and constantly evaluating the lifecycle and ...Full Article

How to Avoid Being a Hacker Victim

Following in the wake of the recently publicized attacks on government databases and systems, all CIOs and chief security officers should assume their own organizations could be next and ...Full Article

Federal State of Cyber Insecurity: New Day, New Breach?

When the United States government accused China of hacking the Office of Personnel Management and gaining access to the records of 4 million current and former federal employees, it ...Full Article
Page 6 of 7« First...34567
EnterpriseAI