• Researchers: Computers' "secure" memory systems utterly insecure

    Attacks on computer memory reveals vulnerability of widely used security systems; information stored in a computer’s permanent memory readily accessible to hackers; laptops especially vulnerable

  • Indian high-tech companies tighten security procedures

    Indian high-tech and software companies, with their constant need for new employees, are easy targets for terrorist infiltration; these companies now take much tougher approach to vetting — and continuously checking — employees

  • Bain's effort to acquire 3Com on verge of collapse

    Bain Capital and a Chinese partner wanted to buy 3Com for $2.2 billion; 3Com’s TippingPoint unit sells security software used by U.S. government agencies, and persistent questions were raised over the national security ramifications of the deal; Bain and Huawei Technologies have now withdrawn their application to CFIUS

  • New malware capture method

    A DHS-funded project promises to give security researchers a new way to kill botnets and targeted malware attacks before they infect computers

  • Decision on Cyber Command's location delayed

    Air Force was supposed to determine the location of the newly created Cyber Command by 1 October; decision delayed to 31 December; four military bases compete for the command

  • Leading companies form an anti-malware testing coalition

    The increasing mismatch between what anti-malware technologies actually do, and the testing methodologies used to evaluate them, lead forty major companies in the field to form a new organization dedicated to promulgating universally adopted standards and guidelines for anti-malware testings

  • NIST launches Web site to validated software security tools for federal IT

    In recent years, the U.S. government has increased the security requirements for federal information systems; to make it easier for IT staff at federal agencies to maintain their systems’ security, NIST, DOD, DHS, and the MITRE Corporation recently introduced a technical framework called the Security Content Automation Protocol (SCAP)

  • IPv6 is about to arrive -- and with it many opportunities

    IPv6 will offer government agencies better security, flexible networking, and a very large number of IP addresses; management will be critical; “It’s a huge shift in paradigm,” says Microsoft’s Sean Siler

  • Sri Lanka blocks SMS as an Independence Day protection measure

    Sri Lankan mobile phone operators ordered to block SMS on mobile phones during the country’s Independence Day celebrations, marking the country’s sixty years of independence; telecom regulator had ordered the suspension of SMS messages, fearing Tamil Tiger rebels could use them to scare people into staying away from celebrations

  • March Networks to acquire Cieffe

    Canadian provider of intelligent IP video acquires innovative designer of award-winning IP video surveillance solutions; acquisition will expand March Networks’ European presence

  • FERC adopts critical infrastructure protection standards

    Federal Energy Regulatory Commission approves eight new mandatory critical infrastructure protection reliability standards; move taken against the backdrop of growing worries in the U.S. intelligence community about attacks on U.S. critical infrastructure

  • EDI to use Xyratex to manage Beijing Airport security

    EDI Technology, a Chinese storage integrator, will use Xyratex F5412E RAID system from Xyratex, a U.K.-based enterprise data storage subsystems and storage process technology provider, for online and archive storage of video surveillance at Beijing Capital International Airport

  • Companies, government responses to war game draw mixed reviews

    Details emerge of a $3 million, invitation-only war game — Cyber Storm —which simulated what DHS described as plausible attacks over five days in February 2006 against the technology industry, transportation lines, and energy utilities by anti-globalization hackers

  • One way to fight criminals, terrorists: Register pre-paid cell phones

    Texas state senator offers legislation, with the support of state police chiefs, which would help in fighting crimes — and terrorism: Legislation would require prepaid cellphone customers to present ID and limit purchases to three phones at a time; it also would require prepaid cellphone service providers to make phone records accessible to police

  • Swedish bank stops sophisticated digital theft

    Forget ski masks and machine guns: Savvy Swedish bank robbers stealthily placed an electronic device under the desk of a bank employee; the device gave instructions to the computer atop the desk to transfer millions of dollars from bank deposits to an account the robbers had set up