• This product description will self-destruct

    Huskies researchers develop a tool to make online personal data vanish; after a set time period, electronic communications such as e-mail, Facebook posts, and chat messages would automatically self-destruct, becoming irretrievable from all Web sites, inboxes, outboxes, backup sites, and home computers

  • Widespread privacy failings in online social networks

    A Cambridge University study finds serious privacy weaknesses in the way social networking sites are run; those who join such site are often unaware of these weaknesses

  • Junk mailers exploit swine flu

    Junk mailers send unsuspected users a Word document posing as a CDC update on the global spread of swine flu; if users open the document, they release a malicious code

  • DARPA awards Cobham $15 million for wireless network

    DARPA awards Cobham a contract calling for the company to develop low-cost wireless network nodes which support adaptation by means of distributed network processing

  • Google, Microsoft promise new age in cyber-security

    Security-conscious consumers are in the habit of regularly updating their antivirus software; this will soon be unnecessary — this, at least, is the promise of both Microsoft and Google; the two companies’ new operating systems will include built-in, continuously updated defenses against viruses and malware

  • Trend: Businesses increasingly rely on SAS for security

    More and more companies have gravitated toward the idea of “software as a service” (SAS) — using software that is delivered remotely instead of hosted on in-house servers; more and more companies are now offering security products as services — but is it the best approach to security?

  • Raytheon wins $155 million wireless contract

    DARPA awards Raytheon $155 million to provide a military wireless network interoperable gateway

  • New distance record for quantum encryption

    Quantum encryption (or quantum key distribution [QKD]) holds the promise of unbreakable communication encryption; the technology has a weakness, though: the short distance of key distribution; researchers break distribution distance record by distributing keys over a distance of 250 kilometers (it may not look like much, but back in 1992 the record was 32 centimeters)

  • Houston computer forensics lab accredited

    Newly accredited Houston lab expands Regional Computer Forensics Laboratory Network (RCFL), a national network of sixteen FBI-sponsored digital forensics laboratories and training centers devoted entirely to the scientific examination of digital evidence in support of criminal investigations

  • GSA adds more cybersecurity software to SmartBuy program

    GSA estimates the contracts could be worth $20 million over five years

  • Congress wants FCC cyber security updates

    FCC among a list of eleven agencies which may have been affected by a 4 July service attack

  • Glass fibers can make a building sturdier

    Conventional means to reinforce concrete involve the use of steel bars; the use of fiber reinforced polymer (FRP) is emerging as a valuable option, owing to its natural resistance to corrosion, its high strength, light weight, transparency to electrical and magnetic fields and ease of manufacturing and installment

  • U.S. secret service forms three new task forces

    New task forces will deal with electronic crimes, and the agency says the partnerships will bring together law enforcement, academia, and private sector

  • Cyber crime bigwigs using big-business tactics

    Cisco cybercrime reports says “The novel thing is that [cybercriminals] have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques”

  • SAIC acquires Atlan

    Large federal contractor acquires McLean, Virginia-based Atlan, a specialist in cybersecurity product testing and certification of FIPS 140-2 and 201 for product vendors