Electronic Engagement

 
If you are ready to jump into the digital world of a bitcoin economy, Cryptocurrency OS might be your most [...]
Source: Technews
Consulting firm Deep Water Point adds longtime intelligence community executive Stephen Prosser. [...]
Source: Washington Technology
Applied Insight books a new task order for cybersecurity services to the Air Force's Air Mobility Command. [...]
Source: Washington Technology
Cornerstone Defense's board of directors elects WBB CFO Richard Harkey as a new member. [...]
Source: Washington Technology
Security researchers at Pen Test Partners have found a privilege escalation flaw in the much-maligned Lenovo Solution Center software. [...]
Source: Kapersky Threatpost - Privacy
The General Services Administration is the government's hub acquisition, so the agency's IG is wondering why it's buying tech from [...]
Source: Washington Technology
Consumers could suffer from sticker shock when it comes time to buy a 5G-enabled phone, suggests a new report from [...]
Source: Technews
Dr. Ian Bremmer, Expert on Global Geopolitics and Political Risk, will open the Global Security Exchange (GSX) 2019, to be [...]
Source: Security Magazine
The Florida Department of Education's budget proposal for the upcoming fiscal year, which began July 1, includes $100 million in [...]
Source: Security Magazine
Many view smart cities as the future of urban living, promising to boost the efficiency and effectiveness of city services [...]
Source: Security Magazine
Employee errors or unintentional actions were behind 52 percent of incidents affecting operational technology and industrial control system (OT/ICS) networks [...]
Source: Security Magazine
Google, Mozilla and Apple have blocked a fake root certificate issued by Kazakhstan's government to spy on its citizens' online [...]
Source: Technews
Cybersecurity and digital forensics are instrumental in creating effective defense, analysis and investigation of cybercrime. While both focus on the [...]
Source: Technews
The personal email addresses - some indicating user names or government official status - of more than a million pornography [...]
Source: Kapersky Threatpost - Privacy
The number of exposed records has hit record highs in just the first two quarters. [...]
Source: Kapersky Threatpost - Privacy
700,000 customer records were exposed after being housed on a vendor's server that lacked appropriate security. [...]
Source: Kapersky Threatpost - Privacy
A new type of malicious plugin has been spotted in the wild with the capability of targeting individual blog posts. [...]
Source: Kapersky Threatpost - Cryptography
Two researchers are being singled out in what are called PGP poisoning or flood attacks that render the authentication tool [...]
Source: Kapersky Threatpost - Cryptography
Google's new multi-party computation tool allows companies to work together with confidential data sets. [...]
Source: Kapersky Threatpost - Cryptography
The Windows 10 update that's rolling out addresses insecure Wi-Fi hotspots with new user notifications. [...]
Source: Kapersky Threatpost - Cryptography

 

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)