The Latest in IT Security

Posts Tagged ‘Manipulation’

The second lesson is that we should be paying more attention to attacks that aim to undermine the legitimacy of an election rather than changing the election’s result. Election-stealing attacks have gotten most of the attention up to now — ­and we are still vulnerable to them in some places — ­but it appears that external threat actors may be more interested in attacking legitimacy.

Read more ...

The Office of Personnel Management (OPM) data breach shows us how espionage is done in the digital world. It’s not only about the theft of information; it’s also about the potential manipulation of personal data. Records can be changed to make a federal employee appear less trustworthy or possibly destroyed to make a person disappear, […]

Read more ...

Summer movies are highly anticipated by the moviegoers, because Hollywood traditionally releases its biggest blockbusters during this season. Fraudsters are relentless in creating fake streaming sites, not just on the screening date of these movies, but also before the release of movies in theaters.The next two charts show which movies are most popular with attackers, as […]

Read more ...


TUESDAY, JULY 23, 2024

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments