-
Hagel says Chinese cyberattacks a “growing threat”
Defense Secretary Chuck Hagel warned of a “growing threat” of cyberattacks against the United States, saying that America and its allies need to “establish international norms of responsible behavior in cyberspace.” Hagel spoke to an audience of defense analysts and defense ministers from Asia and Europe at the annual conference of the International Institute for Strategic Studies on Saturday.
-
-
Android anti-virus products easily evaded: study
Researchers tested ten of the most popular antiviral products for Android and found each could be easily circumnavigated by even the most simple obfuscation techniques. “Many of these products are blind to even trivial transformation attacks not involving code-level changes — operations a teenager could perform,” one of the researchers say.
-
-
Chinese government hackers steal designs of advanced U.S. weapons systems
The Chinese government has been conducting a broad, sustained, and disciplined campaign of cyberattacks against U.S. government agencies, critical infrastructure, private companies, and news organizations. The public version of a study prepared for the Pentagon by the Defense Science Board now says that Chinese government hackers have also been able to penetrate the computer networks of all the major U.S. defense contractors, stealing the designs and specifications of the most advanced weapon system in the U.S. arsenal, and gaining insights into broad technologies on which U.S. military advances are based.
-
-
Quantum cryptography’s security may not be air-tight
Quantum communication systems offer the promise of virtually unbreakable encryption. Unlike classical encryption, which is used to send secure data over networks today and the security of which depends on the difficulty of solving mathematical problems like the factoring of large numbers, most quantum encryption schemes keep the encryption key separate from the data. This approach ensures that an eavesdropper with access only to the data could not decipher the key. Researchers, however, have recently demonstrated that even quantum encryption may be susceptible to hacking.
-
-
Report: U.S. companies should consider counter-hacking Chinese hackers
A group studying how the United States should respond to the sustained campaign of cyberattacks conducted by Chinese government hackers against U.S. companies, said the United States should seriously consider a campaign of retaliatory cyberattacks against the hackers.
-
-
Cyber risks for users of cloud computing
Home computer users and businesses are being warned to consider more closely the risks associated with cloud computing, as well as its many advantages.
-
-
U.S. to help protect private companies from malicious cyberattacks
The U.S. government said it will help protect private companies from cyber attacks. DHS secretary Janet Napolitano said a system is being developed which will monitor Internet traffic directed to critical infrastructure businesses and block attacks on software programs.
-
-
Panel's draft bill shields DHS funds
A house panel introduced a bill last week that will protect DHS from budget cuts facing other domestic agencies under the house’s budget plan. This will allow the department to hire 1,600 new agents at Customs and Border Patrol agency, replace cuts to local and state governments, boost spending on cybersecurity, and abandon cuts to the Coast Guard.
-
-
Cybersecurity framework for critical infrastructure: analysis of initial comments
On 12 February 2013 President Obama issued the “Improving Critical Infrastructure Cybersecurity” executive order, which called for the National Institute of Standards and Technology (NIST) to work with industry to develop a voluntary framework to reduce cybersecurity risks to the nation’s critical infrastructure, which includes power, water, communication, and other critical systems.
-
-
Criminals may use new channels to trigger mobile malware
Researchers have uncovered new hard-to-detect methods that criminals may use to trigger mobile device malware that could eventually lead to targeted attacks launched by a large number of infected mobile devices in the same geographical area. Such attacks could be triggered by music, lighting or vibration.
-
-
Obama administration shifting cybersecurity legislative strategy
The Obama administration’s has shifted its cybersecurity legislative strategy. Rather than emphasize DHS-monitored regulations – an approach which stalled in Congress last summer because of Republican opposition — the administration is focusing on getting Congress to help promote the voluntary adoption by industry of standards being developed by the National Institute of Standards and Technology (NIST) following a February 2013 executive order signed by President Obama.
-
-
New software protects networked control systems from cyber attacks
Researchers have developed a software algorithm that detects and isolates cyber-attacks on networked control systems — which are used to coordinate transportation, power, and other infrastructure across the United States.
-
-
Wave of cyberattacks targets American energy companies
A new wave of cyberattacks has been hitting American corporations, and federal officials, say the attackers, who reside somewhere in the Middle East, are trying to sabotage these corporations. The majority of the targets have been energy companies, and the attacks are trying to take control of company’s processing systems.
-
-
Small, medium businesses suffer record levels of cyber attacks
More small businesses than ever are facing the threat of losing confidential information through cyberattacks, according to research published today by the Department for Business, Innovation and Skills (BIS).
The 2013 Information Security Breaches Survey has shown that 87 percent of small businesses across all sectors of the U.K. economy experienced a breach in the last year. This is up more than 10 percent and cost small businesses up to 6 percent of their turnover, when they could protect themselves for far less.
-
-
Canadian company provides software to U.S. intelligence agencies
A Canadian company has spent the last few years locking up contracts to provide security software to U.S. federal agencies such as the NSA, CIA, and FBI. The company moved from the United States to Canada because the Canadian government gives tax credits for high-tech companies coming to Canada, and Canadian government agencies help the company break into new markets by sponsoring his company in international conferences. It was in one of these conferences that he once met “some NSA folks.”
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.