• Schwarzenegger terminates RFID skimming

    As RFID technology becomes more pervasive — people now use it to gain access to offices, properties, children’s nurseries, parking lots, and others areas — concerns have been growing about wireless “skimming” of the information on the RFID tags; California now bans the practice

  • China spying on Skype users

    Canadian researchers find that China engages in a massive surveillance campaign of users of Tom-Skype, a joint venture between Chinese mobile firm TOM Online and U.S.owened Skype; sensitive words such as “Tibet,” “Taiwan independence,” the Falun Gong, and political opposition to the Communist Party of China are censored and logged

  • DHS, industry promote security awareness month

    Companies offer tips on avoiding and dealing with attacks; October will also see major cybersecurity initiatives in Europe, Asia

  • Briefly noted

    DoE’s networks open to cyberattacks… WiMax emulator debuts… DHS’s radiation program to exceed initial cost estimates…

  • FCC restarts public safety network in the 700 MHz band

    The Federal Communication Commission revives plans for a nationwide emergency network; decision follows disappointing results of the “D Block” auction

  • Washington State, Microsoft sue cyber fear mongers

    Washington State has one of the nation;s toughest anti-spyware laws, and the state attorney general joins with Microsoft to sue companies which use fear to sell security products

  • Web browsers affected by Clickjacking

    US CERT issues a warning about a new cross-browser exploit technique called “Clickjacking”; clickjacking gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable; thus, if a user clicks on a Web page, they may actually be clicking on content from another page

  • Stolen laptops "broadcast" their location to rightful owners

    Huskies researchers develop a software tool which uses the Internet as a homing beam; if the thief uses the stolen laptop to connect to the Internet, the owner receives information on the laptop location (and Macintosh owners also recvied a picture of the thief)

  • U.S.-based computers launch most cyberattacks in 2008

    Computers, or hackers, based in the United States launched most of the cyber attacks in the world between January and September 2008; China-based computers were in second place, and Brazil came in third; United States also led in the number of computers compromised

  • Satellite phone company Iridium acquired for $591 million

    Iridium made a name for itself for going bankrupt eight years ago and being bought for $25 million; it later donated satellite phones to first responders in the aftermath of Katrina; now it is being acquired for half a billion dollars

  • GPS vulnerable to spoofing

    GPS technology is ubiquitous in civilian and military applications; Cornell University researchers raise uncomfortable questions by demonstrating how GPS navigation devices can be readliy duped by transmission of fake GPS signals that receivers accept as authentic ones

  • Cyber Storm II drill shows ferocity of virtual attack

    In March governments from Australia, the United Kingdom, New Zealand, Canada, and the United States ran the largest-ever cyber war games, Cyber Storm II; the drill tested critical infrastructure including dam walls, telecommunications, and government computer networks

  • NATO in major anti-terror drill

    NATO will hold a two-week comprehensive anti-terrorrism drill in Sardinia; 15 nations, 10 agencies will coordinate land, air, sea, space assets in an effort to smooth communication, information sharing, and operational execution

  • Briefly noted

    Aussie cyber security needs work… D.C. policy carry iPhones… Surveillance radar in Indonesian straits… HUD awards Iowa critical infrastructure funds…

  • "Thought helmets" for silent, secure communication among soldiers

    U.S. Army funds research into helmets with embedded sensors which “read” a soldier’s thoughts (well, brain waves) and transmit them, telepathy-like, to their intended target