Security News
The Ohio Lottery was forced to shut down some key systems after a cyberattack affected an undisclosed number of internal applications on Christmas Eve. "Additionally, winning numbers for KENO, Lucky One, and EZPLAY Progressive Jackpots are not available on our website or mobile app but can be checked at any Ohio Lottery Retailer."
It requires a special quality of CISO, and in this installment of SecurityWeek's CISO Conversations series, we talk to three of the best: David Sherry, Ed Hudson and Helen Patton. "I've met female CISOs that I hugely respect, and I've met female CISOs I don't; and I think that's true for men as well. So, I'm hesitant to stereotype a class of people, male or female, as being more of this or less of that. I still look at the individual and the circumstance in which they work as being more important."
"There doesn't seem to be any mitigation of the growing trend of online crime. The first line of defense from online fraud is not a technology solution or even law enforcement; it's user awareness. From a policy perspective, governments and other institutions should get the word out more so that individuals and organizations are more sensitive to online threats." The most popular internet crimes tracked by the FBI were extortion, government impersonation, and business email compromise, which cost victims $1.8 billion in 2019.
Ohio detected and thwarted an election-related cyber attack earlier this month, the state’s elections chief said. Republican Secretary of State Frank LaRose said the “relatively unsophisticated”...
An Ohio gamer upset about a $1.50 bet while playing Call of Duty: WWII online was sentenced Friday to 15 months in prison for recruiting a prankster to make a bogus emergency call that resulted in...
Businesses showing good faith by modeling their cybersecurity after an approved framework will have legal protection under Ohio's Data Protection Act.
Called 'Pathfinders,' these security officials are conducting risk assessments and mitigating vulnerabilities in voting systems.
"High risk" exploit patch was issued in May of 2016.
Several government websites in the US states of Ohio and Maryland had to be shut down Sunday after being hacked to display messages supporting the Islamic State group. Among the affected websites...
Cybersecurity is a form of asymmetric warfare. The attackers need to only succeed once; the defenders must succeed constantly. The attackers share weapons and methods continuously; the defenders...