Security

Protecting our energy infrastructure from cyberattack

Almost every day, news headlines announce another security breach and the theft of credit card numbers and other personal information. While having one's credit card stolen can be annoying and unsettling, a far more significant, ...

Security

Hackers disrupt Iran's rail service with fake delay messages

Iran's railroad system came under cyberattack on Friday, a semi-official news agency reported, with hackers posting fake messages about train delays or cancellations on display boards at stations across the country.

Security

NY transit officials confirm cyberattack; say harm limited

Hackers infiltrated computer systems for the Metropolitan Transportation Authority in New York, setting off a scramble to counter a potentially crippling cyberattack against North America's largest transit system, MTA officials ...

Energy & Green Tech

Researchers protecting solar technologies from cyberattack

New research from the University of Georgia suggests a novel approach to safeguarding one possible target of a cyberattack—the nation's solar farms. In a study published in IEEE Transactions on Smart Grid, a team in UGA's ...

Internet

New cybersecurity guide is the first to gather global expertise

Some of the world's leading experts in cybersecurity have pooled their academic and industry insights to produce an authoritative guide that could help organizations to future proof their resources. The guide, the first of ...

page 2 from 4

Computer insecurity

Many current computer systems have only limited security precautions in place. This computer insecurity article describes the current battlefield of computer security exploits and defenses. Please see the computer security article for an alternative approach, based on security engineering principles.

This text uses material from Wikipedia, licensed under CC BY-SA