#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Cloud Security

Legislation | Breaking Cybersecurity News | The Hacker News

Category — Legislation
South Carolina Bill Targets Cybercrimes with Up to 10-Year Prison Terms

South Carolina Bill Targets Cybercrimes with Up to 10-Year Prison Terms

Dec 21, 2010
Computer hackers and unauthorized informants could face up to 10 years in prison under a proposed state law designed to protect South Carolina military installations from WikiLeaks-type scandals. Charleston Republican Rep. Chip Limehouse announced on Monday that his bill, which will be considered when the legislature reconvenes next month, aims to strengthen the state's laws against computer crimes. The bill also seeks to complement federal laws by imposing additional penalties if classified or confidential information from Shaw Air Force Base, the Marine Corps' Parris Island, or other South Carolina military sites is disclosed. "It will essentially give South Carolina the means to pursue computer criminals," Limehouse said. "Our laws need to keep pace with the evolving digital landscape." Limehouse's bill builds on existing legislation that makes online fraud a felony, punishable by up to a $50,000 fine and five years in prison. Unauthorized public r...
 Banks Lack Cybersecurity Measures: Top Interpol Official Raises Concerns

Banks Lack Cybersecurity Measures: Top Interpol Official Raises Concerns

Dec 20, 2010
A top Interpol chief has expressed concerns about the cybersecurity measures in banks across the region. According to Major Ali Qubaisi, the Interpol team leader for the Middle East and North Africa, and head of the Economic Crimes unit of the Qatari Interior Ministry, banks in the region are "under-protected" against cybercrime. Additionally, legislation is not keeping pace with technological advancements. In an exclusive interview with Emirates 24|7, Major Qubaisi highlighted that the protective measures adopted by Arab banks against cybercrime are insufficient. "Some of these banks are surprised by the number of crimes being committed, but that is due to a lack of protection which should be adopted in this vital sector," he stated. He emphasized that as many as 50% of Arab banks need "electronic patrols." These patrols consist of groups that work online to track and detect any attempts to penetrate a bank's systems. Major Qubaisi explained that mo...
5 Reasons Device Management Isn't Device Trust​

5 Reasons Device Management Isn't Device Trust​

Apr 21, 2025Endpoint Security / Zero Trust
The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors – credentials and devices. This is not news; every report you can find on the threat landscape depicts the same picture.  The solution is more complex. For this article, we'll focus on the device threat vector. The risk they pose is significant, which is why device management tools like Mobile Device Management (MDM) and Endpoint Detection and Response (EDR) are essential components of an organization's security infrastructure. However, relying solely on these tools to manage device risk actually creates a false sense of security. Instead of the blunt tools of device management, organizations are looking for solutions that deliver device trust . Device trust provides a comprehensive, risk-based approach to device security enforcement, closing the large gaps left behind by traditional device management solutions. Here are 5 of those limitations and how to ov...
Expert Insights / Articles Videos
Cybersecurity Resources