Pennsylvania Cyber Attack Causes Disruption to State Courts Website
On Sunday, the official website of Pennsylvania's state courts agency was hit by a cyberattack, causing temporary disruptions to several online systems. Despite the attack, officials have reassured the public that there is no evidence of compromised data, and...
LATEST NEWS
Airforce Launches Bug Bounty Program, Open to Overseas Hackers
The Air Force announced Wednesday that it is launching a bug bounty for several of its public-facing websites, allowing hackers to seek out security...
Chipotle Warns Customers About Breach of Payment System
Fast food chain Chipotle warned customers through a notice on its website on Tuesday that it is investigating a breach of the network that...
Verizon, Corning Collaborate on $1.05B Fiber Optic Deal
Verizon Communications Inc. said Tuesday it has committed to a three-year minimum purchase agreement with Corning Incorporated (NYSE: GLW) to provide fiber optic cable...
Courier Company Hermes Trials Self-Driving Delivery Robots in London
Courier company Hermes announced last week it is partnering with Starship Technologies to launch a testing program for the use of self-driving delivery robots...
Ukraine Partners With Tech Firm Bitfury to Put Government Data on Blockchain Platform
The Bitfury Group, a full service Blockchain technology company, said last week The State Agency for eGovernance of Ukraine signed what it described as...
Tech Companies, Industry Groups Request for Changes to NIST’s Cybersecurity Framework
Tech companies, civil society groups, and individuals have submitted comments in response to the National Institute of Standards and Technology's (NIST) request for public...
FEATURED
POPULAR
EVENTS
JOBS
VENDOR WATCH
We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone
More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...
EXCLUSIVES
Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO
John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of Commerce. Ackerly...
NEWS
- All
- 3D Printing
- 5G
- Acquisitions
- Agencies
- AI
- Announcements
- Appointments
- Blockchain
- Broadband
- Cable
- Cloud
- Collaborations
- Cryptocurrency
- Cyber Insurance
- Cyber Law
- CyberNews
- Energy
- Events
- Exclusives
- Executive
- Featured
- Finance
- Health
- Home Automation
- IOT
- Legal
- Legislation
- Mergers
- Moblie
- Odd
- Open Source
- Press Release
- Privacy
- Products
- Regulatory
- Reviews
- Security
- Smart City
- Smart Grid
- Smart Meter
- Solar
- Startups
- Tech
- Telecommunications
- Vehicles
- Vendor Spotlight
More
NEWS
UK’s Royal Mint, CME Group Trial Blockchain-Based Platform for Trading Gold
Britain's Royal Mint and Chicago-based exchange CME Group Inc are testing a new platform for trading gold based on blockchain technology. RMG (Royal Mint...
Qualcomm Peeved it Must Refund $814.9 Million to BlackBerry
Chipmaker Qualcomm Incorporated announced Wednesday a binding interim arbitration award requiring the company to refund a sum of $814.9 million, plus interest and attorneys’...
Fidelity Collaborates With Academic and Tech Firms to Develop Blockchain Technology
Fidelity Labs, the R&D and Innovation unit of Fidelity Investments, said Monday it is the first in the financial services industry to join faculty...
Justice Department Targets Kelihos Botnet Used Extensively by Cybercriminals
The Justice Department on Monday announced an extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands...
Symantec Attributes CIA-Linked Cyberespionage Toolkit to 40 Spying Operations in 16 Countries
Security company Symantec has attributed cyberattacks against at least 40 targets in 16 different countries to spying and operational protocols revealed in a CIA...
Hackers Target Word Users by Exploiting Microsoft Office Zero-Day Vulnerability
Hackers are exploiting a vulnerability in Microsoft Word which can be manipulated to install malware on targeted computers, even those computers that are fully...