The Cybersecurity 202: Trump's efforts failed to make critical infrastructure safer from cyberattacks, experts say
No:
A 2015 update to the U.S.A. Freedom Act brought changes to the initial program that Snowden disclosed in 2013. Part of the program, which started after the Sept. 11, 2001, terrorist attacks, involved the government's bulk collection of Americans' domestic call logs. Under the 2015 law, that data remained with phone companies but could still be accessed by the government.
121 officials in 31 states said they must replace voting equipment in time for the 2020 election. Moreover, 45 states still use voting equipment that's no longer manufactured Additional funding would also help for training staff, holding post-election audits and securing polling places and storage locations, election officials said.PWNED: Chinese hackers have targeted a slew of universities in the U.S. and around the world, seeking to steal research about maritime technology being developed for military use,The University of Hawaii, the University of Washington and Massachusetts Institute of Technology are among at least 27 universities in the U.S.
FireEye researchers said they have “moderate confidence” that APT40 is a state-sponsored Chinese group, adding that the hackers choose targets that are “consistent with Chinese state interests.” T
इंडिया ताज़ा खबर, इंडिया मुख्य बातें
Similar News:आप इससे मिलती-जुलती खबरें भी पढ़ सकते हैं जिन्हें हमने अन्य समाचार स्रोतों से एकत्र किया है।
North Korea hackers targeting US 'critical infrastructure,' cybersecurity firm saysA group of North Korean hackers is believed to be actively targeting US businesses and 'critical infrastructure,' according to a report released this week by cybersecurity firm McAfee
और पढो »
Analysis | The Cybersecurity 202: Georgia election security fight tees up national debate on paper ballotsThe Cybersecurity 202: Georgia election security fight tees up national debate on paper ballots
और पढो »
Analysis | The Cybersecurity 202: These are the four parts of the economy most vulnerable to cyberattack, according to Moody'sAnalysis: These are the four parts of the economy most vulnerable to cyberattack, according to Moody's
और पढो »
Analysis | The Health 202: Senators say they're serious about tackling surprise medical billsAnalysis: Senators say they're serious about tackling surprise medical bills
और पढो »
Analysis | The Daily 202: Michael Cohen hearing showcased fresh faces – and the significance of divided governmentAnalysis: Michael Cohen hearing showcased fresh faces – and the significance of divided government
और पढो »
Analysis | The Health 202: There are silent skeptics of Jayapal's Medicare-for-all measureOnly 7 of 42 House Democrats who flipped GOP-held districts in 2018 are co-sponsoring the measure.
और पढो »
Analysis | The Energy 202: Two Senate moderates come out against Andrew Wheeler as EPA chiefIt's a sign EPA's rollback of environmental rules is wearing thin among those in the political middle.
और पढो »
Analysis | The Technology 202: Consumers advocates want Washington to tackle 'Wild West' of DNA test kitsPeople buy kits to find their ancestors. Law enforcement and other companies can get that data.
और पढो »
Analysis | The Health 202: Republicans appear open to the administration's Medicare threat to the pharmaceutical industryThe Health 202: Republicans appear open to the administration's Medicare threat to the pharmaceutical industry
और पढो »
Analysis | The Cybersecurity 202: Your phone could soon recognize you based on how you move or walkA Pentagon identity verification system could be commercially available in 18 months.
और पढो »