Western Kentucky University is set to host its first hackathon.
Aaron Brzowski, a WKU senior majoring in robotics who is organizing the event, said he got the idea to start a hackathon at WKU after attending several at other universities
LEHIGH TWP., Pa. – A Lehigh County woman is facing forgery and theft charges after allegedly using her step-father’s identity to apply for more than $18,000 in student loans.
Pennsylvania State Police with the Fogelsville barracks received a complaint from
Ipswitch, the leader in easy to try, buy and use IT and network management software, with offices in the U.S., Ireland, Netherlands and Japan, has earned compliance with the demanding data security requirements of the Health Insurance Portability and
Along with the discounts and offers flooding this festive season, risks of phishing activities, where hackers prey on loopholes in multiple online transactions, also come in. An Amazon user recently shared her experience and how she escaped from possibly a
Last Friday’s daylong cascade of cyber attacks highlighted an issue that until now has largely been a discussion point on security-specific blogs and forums: The internet, and thus much of our modern way of life, is in a precarious state.
The Pwn2Own contest, a hackathon run by security firm Trend Micro’s Zero Day Initiative (ZDI) in Japan sees this year’s winners in Keen Lab, a popular crew of Chinese hackers who hacked Apple’s iPhone and Google’s Nexus device.
THE Australian Reptile Park is reeling after its official Facebook page and that of general manager Tim Faulkner’s have been hacked.
In a statement released this morning the popular Somersby zoo warned current posts, as well as those alerting people
An Evansville man could have been out tens of thousands of dollars to an online hacker.
EPD’s special financial crimes task force and bank officials are trying to figure out how the hackers got their hands on so much money.
The internet of things has ushered in a new age of debilitating DDoS attacks. Last week, armies of poorly secured, internet-connected cameras controlled by the Mirai malware targeted servers that provide a key service to the web, meaning that many
The California Department of Motor Vehicles (DMV) suffered a major system-wide crash on Monday, raising concerns among some observers that the state’s voting system could be vulnerable to hacking.
The state called the failure “catastrophic,” according to the Associated Press.
TO MANY WHO conduct work or research related to digital security, the legislation meant to protect against computer crimes has morphed into something harmful. The 1986 law, the U.S. Computer Fraud and Abuse Act, has been repeatedly described as vague
BOSTON — The Latest on a man who acknowledges launching a computer network attack against Boston Children’s Hospital (all times local):
A Massachusetts man charged in a 2014 computer network attack against Boston Children’s Hospital fell to the
It is becoming increasingly difficult to watch the news without hearing about the latest massive computer hack, whether the victim be a Fortune 500 company or a government entity.
State government computers face an increased number of cyber security threats.
Hacker attempting to rebuild life but criminal record is preventing LulzCart from getting a normal job
Have you ever wondered what happens to an Anonymous hacker after his arrest and sentencing? Softpedia caught up with LulzCart, a prodigious hacktivist that
France’s cyber-security watchdog is briefing the country’s presidential candidates on hacking threats, drawing lessons from attacks that have disrupted the U.S. election campaign.
As France prepares for elections less than six months after the U.S. chooses its own head of
According to a recent report by cybersecurity developer Forcepoint, millennials might pose as serious a cybersecurity risk to enterprise networks as cyber criminals. The research found that the baby boomer generation, those aged 51 to 69, are more cautious online
The latest government statistics from Ipsos MORI show that only 33 per cent of people in the East Midlands are following the Government’s latest advice to use strong passwords made up of three random words.
The Government is urging people
The adoption of new media and online news outlets in Nigeria has increased citizens’ access to information while making it easier for them to contribute to public discourse. However, like everything good, there are downsides and potential side effects. Content
Web-connected gizmos played a major role in Friday’s attack that took down retailer, social media and other websites.
(Bloomberg)—Are you looking forward to the day when your sleeping baby’s diaper tells you it’s wet before the wetness wakes your baby?
More than one-quarter half (28%) of cybersecurity professionals believe that their CISO’s participation level with the board is inadequate
We’ve all heard or read the rhetoric that “cybersecurity has become a boardroom issue.” I certainly agree that we are