-
Pacemakers, other implanted devices, vulnerable to lethal attacks
IT experts reported that security flaws in pacemakers and defibrillators could be putting lives at risk; the experts say that many of these devices are not properly secured and therefore are vulnerable to hackers who may want to commit an act that could lead to multiple deaths
-
-
Social media as preventative method for infectious diseases
When it comes to stopping illness, social media posts and tweets may be just what the doctor ordered; researchers are studying whether a well-timed post from a public authority or trustworthy person could be as beneficial as flu shots, hand-washing, or sneezing into an elbow
-
-
DHS awards $23.6 million to fund development of new software analysis technology
DHS awarded a $23.6 million grant to the Morgridge Institute for Research at the University of Wisconsin-Madison to create the Software Assurance Marketplace, which, over the next five years, will work closely with developers of new software analysis technology and the open source community to advance the security of software; initial operating capabilities for the Software Assurance Marketplace will include the ability continuously to test up to 100 open-source software packages against five software assurance tools on eight platforms, including Macintosh, Linux, and Windows
-
-
New method to rid inboxes of unsolicited e-mail
Spam used to be text-based, but has recently turned high-tech, using layers of images to fool automatic filters; thanks to some sophisticated new cyber-sleuthing, researchers at are working toward a cure
-
-
U.S. electric power grid “inherently vulnerable” to terrorist attacks: report
The U.S. electric power delivery system is vulnerable to terrorist attacks which could cause much more damage to the system than natural disasters such as Hurricane Sandy, blacking out large regions of the country for weeks or months, and costing many billions of dollars, says a newly released report by the National Research Council
-
-
Searching social media sources by geography
Geofeedia, has created a group of algorithms that can search multiple social media sources by geography in real time; the postings, pictures, and tweets that show up in the results of a search are geolocation-enabled, are free, and results can be streamed on a mobile device, computer, or tablet. Businesses may have to pay a fee for more intensive searches
-
-
Students writing their own tickets
Four students at the University of New South Wales say they have cracked the secret algorithm used in Sydney’s public transportation system, which will allow them to print their own tickets
-
-
Georgia Tech releases cyber threats forecast for 2013
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources; those were the findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in this week’s release of the Georgia Tech Emerging Cyber Threats Report for 2013
-
-
Increasing the efficiency of wireless networks
A “spectrum crunch” is quickly being accelerated as customers convert from traditional cell phones to smartphones and tablets; new method, which doubles the efficiency of wireless networks, was developed by researchers; it could have broad impacts on the mobile Internet and wireless industries
-
-
South Carolina exploring different cybersecurity plans
Last month state officials in South Carolina discovered a massive breach at the Department of Revenue; the attack exposed 3.6 million social security numbers of residents in the state, 387,000 credit and debit card numbers, and information for 657,000 businesses as well as other personal information; now, officials are trying to figure out what security measures they need to take in order to prevent another attack
-
-
Michigan launches Cyber Range – a cutting-edge cybersecurity training program
Michigan has launched the Michigan Cyber Range, a state-of-the-art facility that prepares cybersecurity professionals in the detection and prevention of cyber attacks; the initiative pairs cybersecurity resources with hands-on training opportunities to enhance Michigan’s protection of computer systems and sensitive data
-
-
iPhone app lets border crossers determine best time to cross U.S. border
Excessive border waits cause $2.5 billion in losses annually to the San Diego regional economy, with typical two-hour delays for trucks at commercial crossings into San Diego County costing the county $455 million in annual revenue from reduced freight activity; new “crowdsourced” information app allows motorists to decide the best time to cross the border by car or truck; the app’s information is meshed with the data on wait times at the border from U.S. Customs and Border Protection (CBP) to improve the accuracy of the wait times
-
-
Obama, Romney differ on major homeland security issues
Tomorrow, Tuesday 6 November, American voters will choose between Barack Obama and Mitt Romney as the next president of the United States; the state of the U.S. economy and the best ways to reduce unemployment and increase the pace of economic growth were at the center of the campaign, leaving little room for other issues. Homeland security issues, in particular, played little, if any, role in the campaign or in the three debates between the presidential candidates and the debate between the vice-presidential candidates; still, if we examine the policy proposals each candidate has made, and also examine the details of policies posted on his Web sites, the differences between the candidates’ approaches on three major homeland security issues – immigration, cybersecurity, and infrastructure – are considerable
-
-
New international consortium helps shape future cybersecurity practices
The Consortium for Cybersecurity Action (CCA), a newly-formed international consortium of government agencies and private organizations from around the world, will host a conference call to promote the most effective approaches to cybersecurity and support eleven key developments which are shaping events
-
-
Ensuring that software security policies reflect user needs
Researchers have developed a new natural language processing tool that businesses or other customers can use to ensure that software developers have a clear idea of the security policies to be incorporated into new software products
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.