-
Collaborative social media site for ID and biometric professionals
Cost overruns, project delays, and poor performance results have long been the bane of government projects, at times resulting in expensive high-profile failures; to help reduce costs and ensure that government projects meet targeted needs, a new collaborative Web-based information-sharing community aimed at bringing together identity and biometric industry professionals, academics, researchers, and government and commercial procurement officers is slated to open
-
-
Also noted
SEC Says Companies Should Disclose Cyber-Incidents, Risks to Investors | Few in California have insurance for a big earthquake | N.Y. non-profits receive millions in security grants from 2006 to 2009 | Mexican smugglers tunnel beneath Arizona parking lots | ‘Israel will target prisoners who return to terrorism’ | Thai Floods Threaten Public and Private Research | New Metal Deposits Found at Rare Earth Mine | Lawmakers suggest treating drug cartels as terrorist organizations | Private U.K. security firm takes inmates to court in taxis
-
-
Sony hit by hackers again, 93,000 accounts compromised
Once again Sony has been the victim of a major cyberattack. This time as many as 93,000 accounts have been compromised from Sony Entertainment Network, PlayStation Network, and Sony Online Entertainment
-
-
Michigan to launch cyber command center and defense teams
To help boost the state’s economy and its role in securing the nation’s data networks, Michigan recently announced that it plans to launch a cyber command center and cyber defense response teams
-
-
Securing smartphones in battle
As the military moves to incorporate smartphones on the battlefield, critics worry that the inherent security flaws in the devices could result in major data breaches or cybersecurity attacks on the military’s networks
-
-
German police uses backdoor Trojan to monitor Skype calls
A backdoor Trojan capable of monitoring online activity and recording Skype calls has been detected — and is allegedly being used by the German police force
-
-
Tweeting may help in disasters
Social networks like Twitter cannot help prevent disasters, but can quickly correct misinformation resulting from false rumors, thus preventing possible further loss of lives
-
-
Cyber war may never happen
Cyber war, long considered by many experts within the defense establishment to be a significant threat, if not an ongoing one, may never take place according to one expert
-
-
National Cybersecurity Awareness Month launches today
DHS, in announcing the launching of the eighth annual National Cybersecurity Awareness Month (NCSAM), says that this is why cybersecurity is a shared responsibility, and each of individual and organization has a role to play; “Emerging cyber threats require the engagement of our entire society including government and law enforcement, the private sector, and members of the public,” DHS says in a statement
-
-
New report highlights Zeus Trojan's enhancement
New report highlights enhancements of the notorious Zeus Trojan; the enhancements help Zeus undermine tacking and detection aimed at thwarting Zeus
-
-
Better cloud security
Researchers have developed a new, experimental technique better to protect sensitive information in cloud computing — without significantly affecting the system’s overall performance
-
-
GAO: poor security procedures put sensitive government data at risk
A recently released Government Accountability Office (GAO) report found that poor information security practices at U.S. government agencies have put sensitive data and servers at risk
-
-
Registration for CyberPatriot IV competition to end this week
With less than a week left before registration closes, CyberPatriot IV, the National High School Cyber Defense Competition, has more than 850 teams registered; this competition is attracting high school educators across the United States; the structure of the competition provides students hands-on learning while competing virtually against their peers and introduces many to the idea of cyber security as a profession
-
-
DHS begins move to cloud
Last week, federal officials announced that DHS had made its first move to begin consolidating and migrating many of its public websites to cloud servers to reduce costs
-
-
Securing financial infrastructure against cyberattacks
To protect the U.S. financial sector from increasingly ubiquitous and costly cyberattacks, DHS plans to work more closely with other federal agencies as well as the private sector to defend against hackers
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.