Security

What to do if your identity was stolen in mass identity breach

News recently that a malware attack at Detroit-based Wolverine Solutions Group, which handles mailing and other services for hundreds of health care companies, potentially exposed the personal information of hundreds of thousands ...

Engineering

Making smart city infrastructure watertight in Vietnam

Research in the International Journal of Critical Infrastructures offers guidance on securing water critical infrastructures and reaffirms the urgency of protecting environment monitoring technologies as cities evolve into ...

Security

US says Chinese hacking vaccine research: reports

The US Federal Bureau of Investigation and cybersecurity experts believe Chinese hackers are trying to steal research on developing a vaccine against coronavirus, two newspapers reported Monday.

Security

Russian hackers suspected of Sweden cyber attack

Online services at some Swedish government agencies and shops have been disrupted in a ransomware attack believed to have been carried out by a Russian hacker group, IT consultancy Tietoevry said.

Marriott data breach: 500 million times concerned

On November 30, 2018, Marriott International announced an enormous data breach concerning 500 million clients, the second biggest ever. With new data breaches being announced almost daily, you have to ask yourself, how is ...

Business

Modi warns bitcoin could 'spoil' young Indians

Indian Prime Minister Narendra Modi on Thursday warned that bitcoin presents a risk to younger generations, sounding a hawkish tone as his government prepares to introduce legislation to regulate cryptocurrencies.

Energy & Green Tech

Offshore wind farms are vulnerable to cyberattacks, study shows

The hurrying pace of societal electrification is encouraging from a climate perspective. But the transition away from fossil fuels toward renewable sources like wind presents new risks that are not yet fully understood.

page 4 from 7

Computer security

Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.

This text uses material from Wikipedia, licensed under CC BY-SA