Tag: Information Technology

U.S. Weapons System Vulnerable to Cyberattacks

In a digitalized society, the importance of having top-notch cybersecurity has never been more crucial. Cyber-attacks can destroy businesses, reveal sensitive information, and drain your finances. Additionally, according to a new publication, they can also cause mass destruction and death. Recently, an audit by the Government Accountability Office (GAO) of the U.S. military’s newly developed Read More

Smartphones Need Cybersecurity

We live in a digital age where everything is online, and smartphones are an efficient and convenient vehicle to access and share electronic information. However, this accessibility increases the threat of cyber attacks. Malware, viruses, Trojans, and botnets are becoming increasingly common infections on smartphones.  Despite this threat, many people overlook the need for smartphone Read More

Bill Introduced to Assist in Cybersecurity Shortage

As society enters a technology-based age, cybersecurity continues to be a pressing issue. Cyberattacks continue to threaten our national security on a daily basis. One of the most highly publicized cybersecurity breaches occurred in the 2016 elections. While we focused on Russia’s growing military power, they attacked us online and subsequently influenced the election outcome. Read More

Autistic Individuals Can Solve Cybersecurity Shortage

Autistic individuals have greatly contributed to our society and have earned their places in our history books. One noteworthy individual is Albert Einstein. He developed the theory of relativity and is now known as the father of theoretical physics. Another extraordinary individual with autism is Alan Turing, the man who cracked the Nazi Enigma code. Read More

Reality Winner- NSA Contractor Leaks Classified Information

Reality Winner, 26, is an Air Force veteran who worked as a contractor for the National Security Agency (NSA). While working at NSA, she encountered a classified report with proof that Russians interfered with the 2016 presidential elections by penetrating a voting software supplier in Florida. Furthermore, the document provided proof that the government knew Read More

Pin It on Pinterest