October 11, 2013 |
The city's Department of Human Services needs to improve security for the computer system that keeps records on troubled children and youth, City Controller Alan Butkovitz said Wednesday in a report on the department's Family and Child Tracking Systems. DHS did not perform security background checks on employees of the software contractors that developed and maintain the system, Butkovitz said, and former city social workers have continued to have access to it - including one who left about 15 years ago. "Unauthorized access increases the risk that confidential data could be compromised and abused," Butkovitz said in a news release.
August 6, 2015 |
Terry K. Bootle went into the Air Force in July 1958 with a South Carolina high school education. But by the time he retired as a chief master sergeant for security in September 1986, he had earned a bachelor's degree in education at what is now Texas State University in 1977. And he had followed that with a master's in human relations from what is now Webster University in St. Louis in 1978. Mr. Bootle took the Air Force opportunities to earn his degrees because he figured that "if he had more training, he could progress," his wife, Christina, said.
September 22, 2011 |
Viruses, worms, Trojans, phishers, bots. The list of computer threats never shrinks, and the number of devices at risk only grows. Now we have to worry about security on smartphones and tablets along with personal computers and laptops. But could one of the biggest threats to your online safety have two legs, a smart mouth, and a carefree attitude? That's one implication of a recent survey conducted for Trend Micro, a leading computer security company. Forty percent of respondents said they suffered damage from clicking on links "leading to an unexpected place" online, at a cost that averaged about $42. More than a third of those blamed a child for the error.
November 1, 2014 |
When documentary filmmaker Laura Poitras was approached by an anonymous whistle-blower calling himself Citizenfour, he warned her to upgrade her computer security substantially if she wanted to evade government surveillance. "Assume your adversary is capable of 3 billion guesses per second," he wrote her. If anyone was familiar with U.S. officials' formidable capabilities for data mining, it was Edward Snowden, the cynosure of Poitras' alarming film, Citizenfour . It's a rather claustrophobic documentary, made up largely of Snowden - whom Poitras had lobbied strenuously to film - holed up in a hotel room in Hong Kong for eight days.
June 10, 2012 |
Hackers attacked Wawa's website Friday afternoon, replacing images of hoagies and smoothies with a cartoon Hitler. A hacker group called UGNazi announced that it had defaced the website. The group replaced Wawa's promotional content with a portrait of "Kawaii Hitler," an obscure Internet meme. A spokeswoman for Wawa initially denied that the Delaware County company's website had been compromised. But late Friday, Lori Bruce issued a statement acknowledging that visitors were being redirected to a "non-legitimate Web page.
November 22, 1988 |
They call themselves Data Cops. They are the thin line of defense that separates the megabucks corporate computer system from the free-lance hacker with an Apple knock-off and a bad attitude. They are keenly aware of the hacker-induced outbreak of computer viruses that has screwed up computers across the United States, and they are not amused. "We take computer security, as a whole, very seriously," said Jane Paradise, computer security expert at Cigna Corp., explaining why many large corporations have been immune to the recent rash of computer viruses that have fouled up computer banks at universites, government research centers and a few small firms.
July 27, 2000 |
The federal government is not well prepared to deal with computer virus attacks such as the recent "I LOVE YOU" virus, experts told a House of Representatives subcommittee yesterday. "Twenty-two out of the 24 largest federal agencies [studied] have significant computer weaknesses," said Jack Brock, computer issues director for the General Accounting Office, auditors for Congress. The two agencies that received adequate ratings - the National Science Foundation and the Nuclear Regulatory Commission - have not been completely evaluated, he said.
December 27, 2006 |
Reginald Branham became a computer whiz while at Overbrook High School in the 1980s, earning a four-year scholarship to Drexel University and becoming a computer executive. In recent years, however, he had turned his attention to fixing up bars. On Christmas night, Branham, 37, was shot dead at his latest bar, Cognac Corner in the 1400 block of South 21st Street in Point Breeze, making him the city's 402d homicide victim of the year. Police were not talking about a motive yesterday, but on the street outside the bar, those who said they knew Branham spoke of a possible hit and witness intimidation involving an earlier shooting.
June 8, 2012 |
FORT MEADE, Md. - The U.S. State Department took extraordinary steps to limit harm to foreign relations and individuals after an Army private allegedly sent more than 250,000 classified diplomatic cables to the secret-sharing website WikiLeaks, two agency officials testified at a court-martial hearing Thursday. One group of up to 25 high-ranking officials worked around the clock to try to get ahead of the problem before WikiLeaks began publishing the cables on Nov. 28, 2010, said Rena Bitter, director of the agency's operations center.
September 9, 2007 |
Growing up in Newark, N.J., Richard Epstein wanted to be a professor so he could be a writer like the city's native son, Philip Roth. Being a writer wasn't exactly what his parents had in mind for him, however. "It so upset my parents. My father said that writing was like a hobby," he recalled. Epstein went on to become a professor of computer science at West Chester University. Now a West Chester resident, he also found a way to combine his work in computer science, particularly ethics, with his desire to write.