Electronic Engagement
One of the biggest problems for those of us who have electric cars is charging. Chargers that drop the charging [...]
Source: Technews Lockheed Martin and the University of Central Florida (UCF) celebrated the grand opening of a Cyber Innovation Lab on UCF's [...]
Source: Security MagazineThreat-hunters say the breached data from the massive Equifax incident is nowhere to be found, indicating a spy job. [...]
Source: Kapersky Threatpost - PrivacyData-exposure "lowlights" for the week ending Feb. 15, 2019. [...]
Source: Kapersky Threatpost - PrivacyThe current state of threats means that year-old U.S. Cyber Command will likely need to expand, according to its commander, [...]
Source: Washington TechnologyTecolote Research of El Segundo, California, will support acquisition efforts for the Air Force Space and Missile Systems Center under [...]
Source: Washington TechnologyDespite a welcome and needed DNS revamp, preventable abuse continues. [...]
Source: Kapersky Threatpost - CryptographyAgencies struggle to get beyond status quo compliance with FITARA and their annual grades, but there's a way contractors can [...]
Source: Washington TechnologyNASA's Marshall Space Flight Center is looking for support for research & development efforts around robotic space missions. [...]
Source: Washington TechnologyHealth and safety incidents have become the leading financial loss drivers for businesses around the globe, with cumulative losses now [...]
Source: Security MagazineWhat can law enforcement and enterprise security do to undermine terrorism, including that of the family affiliated variety? [...]
Source: Security Magazine(ISC)² has launched its Professional Development Institute (PDI) to combat the global shortage of skilled and trained cybersecurity professionals. [...]
Source: Security MagazineApple plans to launch a subscription news service at an event next month. The service has been described as "Netflix [...]
Source: Technews Kristie Grinnell, CIO & VP Information Technology & Supply Chain at General Dynamics Information Technology, and Maryfran Johnson get together [...]
Source: CSO Online - Security LeadershipResearchers have identified multiple security issues with this Lenovo smartwatch. [...]
Source: Kapersky Threatpost - CryptographyResearchers have identified multiple security issues with this Lenovo smartwatch. [...]
Source: Kapersky Threatpost - PrivacyAmazon has scooped up mesh WiFi network maker Eero, the home network company known for making an easy-to-set-up product that [...]
Source: Technews Dunkin' Donuts' loyalty program was hit with a credential stuffing attack that targeted names, email addresses, 16-digit DD Perks account [...]
Source: Kapersky Threatpost - PrivacyPresident Donald Trump has signed an executive order aimed at boosting artificial intelligence R&D in the U.S. The order sets [...]
Source: Technews Google's Adiantum boosts encryption for low-end devices with processors that do not have hardware support for AES. [...]
Source: Kapersky Threatpost - Cryptography