• Permanent denial-of-service attack sabotages hardware

    HP’s Rich Smith to demonstrate a permanent denial-of-service (PDOS) attack that remotely wipes out hardware via flash firmware updates

  • Verizon, AT&T win DHS contracts

    Verizon, AT&T win contracts worth nearly $1 billion to provide DHS with IP and security services as well as emergency communication services

  • Banks rely on spyware to detect rogue traders, false rumors

    Growing worries about the financial consequences of rogue traders’ unauthorized activity and false rumors spread in order to manipulate stock price, more and more companies – especially in the financial sector – are installing spyware to monitor their employees’ every move and utterance

  • WorkLight says RSA chief's observations ring true

    RSA boss Art Coviello offers his insights on Web security, saying that hackers are developing plans to attack healthcare providers as their revenue streams from the financial services sector start to dry up; Coveillo also says that biometric technology is not a solution for IT security – at least so far

  • An HSDW conversation with John Stroia, vice president, Government Security and Monitoring Solutions, Diebold

    Diebold has been adding “layers of protection” to its customers since 1859; Diebold provides one-stop shopping for technology-based electronic systems, software, and services, and the company is active in all four major security markets: financial; commercial (retail); enterprise (large corporations); and government

  • Tyco sells M/A-COM for $425 million

    Tyco sells its radio frequency components and subsystem business to Cobham Defense Electronic Systems

  • NATO to help Estonia’s cyber defense

    Last year Estonia became the first nation to suffer a systematic, sustained cyber attack that brought the Baltic nation’s infrastructure to halt; Russian nationalists, and probably agencies of the Russian government, were implicated in the attack; NATO wants to help

  • The economics of cyber - and infrastructure -- security

    New book explores the economics of protecting cyberspace; the book “links our nation’s critical infrastructures across public and private institutions in sectors ranging from food and agriculture, water supply and public health, to energy, transportation and financial services,” says one of the authors

  • Emergence of violent Islamist groups in U.S. aided by Internet

    The Internet helps fuel – and channel – Islamic extremism in the United States; a congressional report says that the U.S. government has “no cohesive and comprehensive outreach and communications strategy in place to confront this thread.”

  • Hacker posts data of six million Chileans

    The personal information of one-third of the Chilean population posted on the Web, including information on the prime minister’s two daughters

  • FBI probes counterfeit Chinese network gear

    The FBI launched Operation CiscoRaider aimed at getting to the bottom of a potentially serious problem: Counterfeit Cisco routers made in China and sold to U.S. IT vendors working on sensitive government computer systems; there is fear that the forged hardware would allow a Chinese intelligence backdoor into secret U.S. information

  • U.S. wireless landascpe about to change

    Clearwire, Sprint Nextel to form $14.55 billion wireless company which will deploy WiMAX networks across the United States; WiMAX’s speed dwarfs current wireless technologies, holding the potential of rendering cable and phone line Internet obsolete

  • Malicious hardware may be next hacker tool

    Next threat on the computer security front: Malicious hardware; malicious hardware is more problematic because it is more difficult to detect; China is already using an early, and simple, version of malicious hardware in its massive military and industrial espionage campaign against Western countries and companies

  • Cybersecurity agenda for the next president

    Cybersecurity is not a technical issue, but a matter of culture, education, and self-interest; government cannot regulate information technology security, and industry cannot do the job by itself

  • Security companies criticize Defcon virus contest

    Hackers’ event, Defcon, will hold a contest to see who can develop the best virus to beat antivirus software; prizes range from “Most elegant obfuscation” to “Most deserving of beer”; antivirus vendors upset