-
HPDC to publish best grid computing cybersecurity papers
In the late 1990s, as science was pushing new limits in terms of levels of computation and data and in the collaboration between scientists across universities, countries, and the globe, grid computing emerged as the model to support such large scientific collaborations by providing their computational resources and the structure behind them
-
-
2012 National Collegiate Cyber Defense Competition kicks off 20 April
The National Collegiate Cyber Defense Competition (NCCDC) is returning to the University of Texas at San Antonio (UTSA) for the seventh consecutive year; the 3-day national championship will kick off 20 April
-
-
U.S. power and water utilities face daily cyberattacks
American water and energy companies deal with a constant barrage of cyberattacks on a daily basis; these incidents usually take the form of cyber espionage or denial-of-service attacks against the utilities’ industrial-control systems
-
-
Passwords contribute to online insecurity
One percent of passwords can be cracked within ten guesses; German and Korean speakers also had passwords which were more difficult to crack, while Indonesian-speaking users’ passwords were the least secure
-
-
Cyberweapon blowback
The real concern about Stuxnet is that its existence demonstrates what is achievable; security analysts are confident that they can stop anything that is a variant of Stuxnet, but the real challenge is stopping something in the style of Stuxnet; this is where the confidence ends
-
-
U of T-led research team discovers new quantum encryption method to foil hackers
Quantum cryptography is, in principle, a foolproof way to prevent hacking; it ensures that any attempt by an eavesdropper to read encoded communication data will lead to disturbances that can be detected by the legitimate users
-
-
zvelo reaches 100 OEM milestone
Pivotal milestone attributed to strong adoption of zvelo’s URL database, website categorization and malicious website detection solutions for a vast array of applications
-
-
Dueling legislation over cybersecurity regulations
Attacks on U.S. critical infrastructure may bring about a Katrina-like situation: no electricity, no fresh water, limited traffic control, severely curtailed emergency response, and more; about 85 percent of U.S. critical infrastructure is privately owned; two different cybersecurity bills in Congress envision different solutions to U.S. infrastructure’s cyber vulnerability
-
-
Including ads in mobile apps poses privacy, security risks
Researchers have found that including ads in mobile applications (apps) poses privacy and security risks; in a recent study of 100,000 apps in the official Google Play market, researchers noticed that more than half contained so-called ad libraries, and that many of the apps included aggressive ad libraries that were enabled to download and run code from remote servers, which raises significant privacy and security concerns
-
-
Triple-threat computer protection reduces identity theft
Having a triple-threat combination of protective software on your computer greatly reduces your chances of identity theft; computer users who were running antivirus, anti-adware, and anti-spyware software were 50 percent less likely to have their credit card information stolen
-
-
The Red Cross, emergency response, and Twitter
Social media has become such an integral part of our lives that emergency responders are now turning to Twitter and Facebook to gain valuable information during natural disasters or crises
-
-
U.K. holds amateur cybersecurity challenge to spur interest in field
For the past several weeks amateur cybersecurity experts have been searchingfor malware, defending against cyberattacks, and raising firewalls as part of Britain’s Cyber Security Challenge
-
-
NATO commander target of persistent Facebook cyberattacks
The senior commander of NATO has been the target of repeated Facebook-based cyberattacks that are believed to have originated from China; Admiral James Stavridis is the subject of a campaign to gain information about him and his colleagues, friends, and family
-
-
Growing unease over illegal cell phone jammers
For less than $40 nearly anyone can purchase a cell phone jamming device to prevent those nearby from making calls, which has law enforcement agencies uneasy
-
-
Cambridge first year student wins U.K. Cybersecrity Challenge competition
Cyber Security Challenge U.K. announces a winner and unveils this year’s new Challenge program (open for registrations as of yesterday); the winner, Jonathan Millican, competed with thousands of registered candidates in 6-month competition
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.