{% text "preview_text" label="Preview Text This will be used as the preview text that displays in some email clients", value="", no_wrapper=True %}


linkedin facebook twitter instagram
More from the debate over the use of ID.me's facial recognition products by government agencies. A closer look at the tools used by the hackers who breached Iranian state TV. And another community college grapples with ransomware. This is CyberScoop for February 18. Editor's note: Due to Monday's federal holiday, our next issue will publish on February 22.

What’s in a name

Identity verification technology company ID.me quietly deployed a powerful form of facial recognition on unemployment benefits applicants while encouraging state partners to dispel the idea that the company used the technology, according to Oregon state records that the American Civil Liberties Union shared with CyberScoop. Privacy advocates say the documents raise concerns about whether states knew what kind of risk ID.me's fraud detection technology held. But ID.me says it fully communicated with states over the differences in its fraud detection and verification systems. Tonya Riley takes a look at how states are dealing with revelations about the company.

A Message From AWS Educate

With over 1,500 institutions and hundreds of thousands of students who use AWS Educate, we wanted to take you on a trip around the world and highlight how students are learning and innovating with the cloud. Learn more.

New technical details from the Iranian state TV hack

An Iranian state television broadcast was hacked Jan. 27, during which a video showed opposition figures and called for the death of the Iranian supreme leader. A group called "Predatory Sparrow" claimed responsibility, without proof, and the hack was just one in a series of incidents seemingly aimed at embarrassing the Iranian government. Check Point Research obtained some of the malware associated with the hack, finding that the incident may have been more destructive than initially assumed. AJ Vicens has more.

Not all was lost in ransomware incident at college

A ransomware attack took out a Seattle-area community college’s website and some other services this week, but the incident was relatively contained because the institution recently has moved a lot of its digital infrastructure to a cloud-based platform, officials said. “While the attack is clearly challenging and disruptive, we’re in a better place to combat it due to changes we implemented over the last two years,” Centralia College President Bob Mohrbacher said. Last week a Northern California community college also dealt with a ransomware incident. EdScoop’s Emily Bamforth explains.

Tweet Of The Day


Want more? Catch our events for all things workforce!
{% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} Copyright (c) 2019 WorkScoop, All rights reserved.

{{ site_settings.company_name }}
{{ site_settings.company_street_address_1 }}
{{ site_settings.company_city }} {{ site_settings.company_state }} 20036

Update your email preferences
Unsubscribe {% end_widget_attribute %} {% end_widget_block %} {# {% widget_block rich_text 'unsubscribe' label='Unsubscribe' overridable=true no_wrapper=true %} {% widget_attribute 'html' %} You received this email because you are subscribed to {{ subscription_name }} from {{site_settings.company_name}}. If you prefer not to receive emails from {{site_settings.company_name}} you may unsubscribe or set your email preferences. {% end_widget_attribute %} {% end_widget_block %} #}