Electronic Engagement

 
One of the biggest problems for those of us who have electric cars is charging. Chargers that drop the charging [...]
Source: Technews
Lockheed Martin and the University of Central Florida (UCF) celebrated the grand opening of a Cyber Innovation Lab on UCF's [...]
Source: Security Magazine
Threat-hunters say the breached data from the massive Equifax incident is nowhere to be found, indicating a spy job. [...]
Source: Kapersky Threatpost - Privacy
Data-exposure "lowlights" for the week ending Feb. 15, 2019. [...]
Source: Kapersky Threatpost - Privacy
The current state of threats means that year-old U.S. Cyber Command will likely need to expand, according to its commander, [...]
Source: Washington Technology
Tecolote Research of El Segundo, California, will support acquisition efforts for the Air Force Space and Missile Systems Center under [...]
Source: Washington Technology
Despite a welcome and needed DNS revamp, preventable abuse continues. [...]
Source: Kapersky Threatpost - Cryptography
Agencies struggle to get beyond status quo compliance with FITARA and their annual grades, but there's a way contractors can [...]
Source: Washington Technology
NASA's Marshall Space Flight Center is looking for support for research & development efforts around robotic space missions. [...]
Source: Washington Technology
Health and safety incidents have become the leading financial loss drivers for businesses around the globe, with cumulative losses now [...]
Source: Security Magazine
What can law enforcement and enterprise security do to undermine terrorism, including that of the family affiliated variety? [...]
Source: Security Magazine
(ISC)² has launched its Professional Development Institute (PDI) to combat the global shortage of skilled and trained cybersecurity professionals. [...]
Source: Security Magazine
Apple plans to launch a subscription news service at an event next month. The service has been described as "Netflix [...]
Source: Technews
Kristie Grinnell, CIO & VP Information Technology & Supply Chain at General Dynamics Information Technology, and Maryfran Johnson get together [...]
Source: CSO Online - Security Leadership
Researchers have identified multiple security issues with this Lenovo smartwatch. [...]
Source: Kapersky Threatpost - Cryptography
Researchers have identified multiple security issues with this Lenovo smartwatch. [...]
Source: Kapersky Threatpost - Privacy
Amazon has scooped up mesh WiFi network maker Eero, the home network company known for making an easy-to-set-up product that [...]
Source: Technews
Dunkin' Donuts' loyalty program was hit with a credential stuffing attack that targeted names, email addresses, 16-digit DD Perks account [...]
Source: Kapersky Threatpost - Privacy
President Donald Trump has signed an executive order aimed at boosting artificial intelligence R&D in the U.S. The order sets [...]
Source: Technews
Google's Adiantum boosts encryption for low-end devices with processors that do not have hardware support for AES. [...]
Source: Kapersky Threatpost - Cryptography

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)