The University is working with authorities to resolve the incident and understand what data has been accessed
More Stories
AI and the Evolution of Social Media
Oh, how the mighty have fallen. A decade ago, social media was celebrated for sparking democratic uprisings in the Arab...
NCSC Publishes Security Guidance for Cloud-Hosted SCADA
The UK’s National Cyber Security Centre wants to help organizations migrate their SCADA systems to the cloud Read More
Prolific Chinese Threat Campaign Targets 100+ Victims
Trend Micro uncovers Chinese cyber-espionage campaign Earth Krahang Read More
Moldovan Behind E-Root Marketplace Gets US Federal Prison Term
Sandu Boris Diaconu was involved in conspiracy to commit access device and computer fraud Read More
FCC Agrees to Cyber Trust Mark for IoT Products
The voluntary FCC program will allow smart device manufacturers to demonstrate to consumers that their product has met robust cybersecurity...
Over 50,000 Vulnerabilities Discovered in DoD Systems Through Bug Bounty Program
Seven years into its ethical hacking program, the Pentagon received its 50,000th vulnerability report on March 15 Read More