• How to create the perfect fake identity

    If you have the patience and time, you can use “identity farming” to create the perfect fake identity; IT security maven Bruce Schneier writes that the ever more central role data — and data shadow — are playing in our lives now makes it possible

  • Virtualization is important for back up and recovery

    Server virtualization, that is, the separation of functionality from the underlying hardware, offers organizations many advantages in preparing for coping with and recovering from disasters, but it is not a panacea

  • D.C. tests interoperable public safety system

    Interoperability between radio and mobile Internet sought, and new technology — called Radio Over Wireless Broadband, or ROW-B — has the potential to save first responders time in an emergency

  • Cyber war fears grow after Georgia Web sites attacked

    Analysis of the attacks on official Georgia’s Web sites during and following the 8 August Russian incursion lead experts to suspect that rather than initiated by the Russian government, the attacks were the result of cyber “militias” or “hacktivists”; this is worrisome because it highlights the ability of small bands of hackers, let alone governments, to disrupt communication networks and critical infrastructure

  • Data breaches in U.S. already surpass 2007 total

    The number of reported data breaches in the United States has already surpassed 2007’s total; more states now require breach reporting; experts also say that the development of SQL injections made breaches much easier

  • Bay Area's FasTrak road tolls easy to hack

    Toll transponders can be cloned, allowing fraudsters to travel for free while others unwittingly foot the bill; more seriously, criminals could use the FasTrak system to create false alibis by overwriting one’s own ID onto another driver’s device before committing a crime

  • New system thwarts Internet eavesdropping

    The growth of wireless networks has increased the risk of eavesdropping on Internet communications; Carnegie Mellon researchers develop a low-cost system that can thwart these Man-in-the-Middle (MitM) attacks

  • Britain "under constant attack in cyberwar"

    The U.K. government warns a cyberwar is being waged against Britain with key computer networks coming under attack every day

  • EAGLE task order opportunities

    With the federal fourth quarter underway, vendors are wondering where end-of-year spending will happen; task order vehicles are an obvious place to look because task orders can be competed and awarded quickly; DHS’s EAGLE task order is one example

  • New immunization strategy better in handling epidemics, computer viruses

    New immunization approach fragments the population to be immunized into many connected clusters of equal size; by creating equal-size clusters, doses do not have to be “wasted” on isolating very small clusters, as in the traditional targeted strategy

  • Legal skirmish over Defcon talk shows divide on disclosing security flaws

    Gag order slapped on MIT students who prepared a talk about Boston transit authority security flaw reignites debate over what “responsible disclosure” of security flaw means

  • Indian SMBs will spend $289 million on security related investments this year

    Business in India are becoming more aware of security threats and the need for continuity planning; the top three key trends among India SMBs are UTM (Unified Threat Management), BCS (Business Continuity Solutions), and MSS (Managed Security Services)

  • GSA implements IPv6

    GSA becomes the first civilian agency to implement IPv6; the current IPv4 uses 32-bit addresses, meaning it can offer about 4.3 billion addresses total; IPv6 uses 128-bit addresses, so it can offer an almost unlimited number of addresses — the first step toward achieving fully networked functionality among all electronic devices

  • Pentagon suspends USAF cyber effort

    The growing dependence of governments and militaries on the Internet has led the U.S. Air Force to create a new Cyber Command; the Air Force has now put this effort on hold

  • Who is behind cyber attacks on Georgia?

    Sustained cyber attacks of Georgian official Web sites, attacks which immediately preceded and then accompanied the Russian military action against the former Soviet republic, originated from a “hacker militia” of Russian botnet herders and volunteers