• The 2010 Security Treasure Hunt cybersecurity competition launched in California

    California on Tuesday launched the 2010 Security Treasure Hunt; the online competition is part of a national effort to identify young men and women with the potential to become world-class cybersecurity professionals

  • To avoid cyberwar and protect infrastructure -- fight cybercrime first

    Fighting cybercrime is the first step to avoiding cyberwar, protecting infrastructure; Christopher Painter, the White House’s senior director for cybersecurity: “There are a couple of things we need to do to harden [critical infrastructure] targets” — “But the other thing you need to do is reduce the threat. And the predominant threat we face is the criminal threat — the cybercrime threat in all of its varied aspects”

  • Cybersecurity companies weather the economic downturn

    Cybersecurity companies may have suffered during the economic downturn — but they suffered less; some companies even saw an increase in revenues; “The things that we’re delivering have become more of a necessity than a nice to have,” says the president of an Iowa-based company which provides technical support and corporate security for desktop computers — and which increased its annual revenue by 41 percent in 2009

  • IT experts: Security risks of cloud computing outweigh benefits

    Cloud computing services are expected to experience dramatic growth, hitting $44.2 billion by 2013, outpacing traditional IT spending; other estimates, including a recent study by Global Industry Analysts, indicate that by 2015 cloud computing services could represent a more than $200 billion market opportunity; still, worries about the security of cloud computing linger: 45 percent of IT professionals responding to an ISAAC survey say the risks of cloud computing outweigh the lower total cost of ownership (TCO), high return on investment (ROI), increased efficiency, and pay-as-you-go services

  • FCC to move forward with national broadband plan

    FCC will move forward on the with key recommendations in its national broadband plan — even though a federal appeals court this week undermined the agency’s legal authority to regulate high-speed Internet access; plan calls for advancing “robust and secure public safety communications networks”

  • Schmidt: private sector key to warding off cyber attacks

    White House cybersecurity coordinator says the private sector is where the best defense against cyberattacks and cyber warfare can be mounted; the government can do a lot to improve U.S. cyber defenses, but the key to warding off attacks remains private-sector vigilance; one major technology Web site agrees: “This is a battle every IT security professional must fight from the foxholes”

  • Hamas: Israel using Facebook to recruit spies in Gaza

    Hamas claims Israeli intelligence uses information Palestinians from Gaza put in their profiles on Facebook to pressure them to become spies for Israel; it is not clear how someone can be blackmailed or coerced into a risky spying career using information in the public domain, and it seems more likely Israel is using social networking to map contact networks

  • Son files harassment charges against mother for Facebook posts

    A 16-year old sues his mother for tampering with his Facebook account; he filed charges against her last month and requested a no contact order after he claims she posted slanderous entries about him on the social networking site; he alleges she hacked his account, changed his password, and posted things that involve slander about his personal life

  • U.S. government encounters shortage of skilled cyber-security workers

    DHS and the FBI, among other government agencies, are now posting job openings in cybersecurity, describing the chief responsibilities of these jobs as preserving the nation’s freedoms and securing the homeland; the recruitment campaign is going slowly because the pool of truly skilled security professionals is a small one, and the government is only the latest suitor vying for their talents

  • Federal IT professionals: Cyberattack on U.S. critical infrastructure looming

    More than half of federal IT professionals surveyed believe the potential is “high” for a cyberattack from a foreign nation against critical IT infrastructure in the next year; moreover, 42 percent of them think the U.S. government’s ability to prevent or handle such an attack is merely fair to poor.

  • More employers track their employees' every digital move

    More and more companies are more and more interested in what their employees are doing with their PCs, laptops, and smartphones while in the office; sophisticated tracking and monitoring solutions allow employers to monitor any information its employees post publicly on Facebook and Twitter, and read e-mails and instant messages (even those you typed but decided not to send)

  • Cybercriminals exploit search engine optimization techniques

    Cybercriminals have another tool at their disposal: search engine optimization (SEO); hackers use automated kits to apply blackhat SEO methods — cynically exploiting tragic or salacious breaking news stories — to subvert searches in order to point surfers toward scareware download portals or other scams

  • FAA bolsters cybersecurity with help from IBM

    Malware introduced into the U.S. Federal Aviation Administration’s (FAA) computer network which monitors and controls U.S. aviation can bring down a plane and cause havoc as surely as liquid explosives or underwear bombs can; the IBM is teaming up with the FAA to build a cybersecurity system which will improve defense against cyberattacks on the U.S. civilian aviation network; the flexible model used in the prototype system will be designed to look retrospectively at event occurrences and system compromises, and it will also be able to correlate historical traffic patterns with dynamic data from monitors, sensors, and other devices capturing information about network traffic and user activity in real time

  • U.S. cybersecurity spending to rise

    The rate of cyberattacks on U.S. government’s networks and U.S. critical infrastructure, and the growing complexity of IT infrastructure, are driving the surge in federal cybersecurity spending; the U.S. federal government’s total cumulative cybersecurity spending would be $55 billion between 2010 and 2015

  • Experts say smart meters are vulnerable to hacking

    In the United States alone, more than eight million smart meters have been deployed by electric utilities and nearly sixty million should be in place by 2020; security experts are worried that this rush to deployment of smart meters ignores serious security vulnerabilities: the interactivity which makes smart meters so attractive also makes them vulnerable to hackers, because each meter essentially is a computer connected to a vast network