Remove tag washington
article thumbnail

The History of Computer Viruses & Malware

eSecurity Planet

Though this work began in the 1940s, it, along with his other work in the field of self-replication, was eventually compiled and distributed via the 1966 paper “Theory of Self-Reproducing Automata.”. Named after a character from “Scooby-Doo,” the Creeper was originally intended as a security test for the U.S.

article thumbnail

President’s Council of Advisors on Science and Technology Release Health IT Report

Hunton Privacy

While much of the attention of the privacy policy community in Washington, D.C. These individual pieces are called “tagged data elements,” because each unit of data is accompanied by a mandatory “metadata tag” that describes the attributes, provenance, and required security protections of the data.”.

IT 40