-
WikiLeaks hit by cyberattack
On Tuesday night, the whistle-blower site WikiLeaks suffered from a cyberattack that crashed its homepage; the attack comes shortly after the group released nearly 134,000 additional State Department cables
-
-
IBM acquires security threat, fraud detection software developer
Acquisition extends IBM’s menu of offerings for governments, law enforcement, retail, insurance, and healthcare clients in what the company describes as “the Era of Smarter Cities”
-
-
New Windows worm spreading by exploiting weak passwords
A new Windows worm is spreading through company networks by exploiting weak passwords; the worm, dubbed “Morto” spreads using RDP, or Remote Desktop Protocol, the Microsoft-made protocol for controlling one computer by connecting to it from another
-
-
Chinese TV shows cyber-attack software
A Chinese government TV station, perhaps inadvertently, shows a government cyberattack aimed at Falun Gong computers; the video identifies the software as being written by the Electrical Engineering University of the People’s Liberation Army; the video — which has been removed from the TV station’s Web site — provides direct evidence of Chinese government involvement in cyberattacks
-
-
Penn State offers online minor in homeland security
Penn State is the latest to join the handful of educational institutes offering a minor in homeland security; the degree is available online and is designed to provide students with the skills needed to enter the homeland security field
-
-
TSA Blackberries vulnerable
The Transportation Security Administration’s (TSA) Blackberry mobile devices are vulnerable to cybersecurity threats due to a backlog of security patches and their configurations; with these vulnerabilities, hackers could exploit unsecured wireless networks to monitor data transmissions, execute denial of service attacks, alter messages, or even impersonate legitimate users to steal sensitive data provided by airline passengers
-
-
Rampant insider hacking at U.S. immigration agency
A yearlong investigation by the DHS Inspector General has revealed multiple instances of insider hacking at U.S. Citizenship and Immigration Services (USCIS); the inspector general found that employees had accessed management-level email and other confidential files
-
-
Cyber experts dispute McAfee's Shady RAT report
Earlier this month, cybersecurity experts discovered a five-year operation that infiltrated U.S. government and UN computer networks; China is believed to be the culprit behind the systematic attacks, dubbed “Operation Shady RAT,” which also hit major defense contractors and private businesses; many within the cybersecurity community are disputing the significance of the finding
-
-
Japanese pharmaceutical crippled by insider cyberattack
Last week a disgruntled former contract employee pleaded guilty for severely disrupting the networks of Shionogi, a Japanese pharmaceutical firm; the attacks were so severe that they crippled Shionogi’s operations for “a number of days, leaving employees unable to ship products, to cut checks or even communicate via email,” according to court documents
-
-
Hong Kong arrests stock exchange hacker
Last Friday authorities in Hong Kong announced that they had arrested a man for hacking into the city’s stock exchange and disrupting the trades of seven companies; two weeks ago the Hong Kong stock exchange’s website was hit with a malicious attack that caused several firms including global banking giant HSBC and the international airline Cathay Pacific to suspend trading for half a day
-
-
Anonymous retaliates against BART
The hacking collective Anonymous released personal data on Sunday belonging to more than 2,000 public transport customers in the San Francisco area in retaliation for the Bay Area Rapid Transit (BART) system’s shutdown of mobile phone service on Thursday night
-
-
ManTech wades into private cybersecurity market
In an increasing trend, more traditional defense contractors are seeking to expand their businesses by entering the burgeoning field of cybersecurity for commercial companies; after disposing of its private sector cybersecurity business in 2002, ManTech International is seeking to enter the market once more
-
-
Attackers have advantage in cyberspace, says cybersecurity expert
Homeland Security NewsWire’s executive editor Eugene Chow recently caught up with Bruce Schneier, a cybersecurity expert and the author of several bestselling books, including “Applied Cryptography,” “Secrets and Lies,” and “Beyond Fear”; in the interview Schneier discusses the recent politically motivated cyberattacks by Anonymous and AntiSec, securing U.S. networks against counterfeit computer chips, and President Obama’s proposed cybersecurity plan
-
-
London police use smartphones, social network to identify rioters
The rioters in London — and now, in other British cities — have been using Blackberries to outmaneuver the police; communicating via BlackBerry instant-message technology, as well as by social networking sites like Facebook and Twitter, the rioters repeatedly signaled fresh target areas to those caught up in the mayhem; RIM has now agreed to cooperate with Scotland Yard to turn over protestors using the service to coordinate their assaults; the police is also releasing CCTV images of the rioters to a group using face recognition technology to identify and condemn rioters; the police is also using Flickr, Tublr, and Twitter to spot and identify participants in the riots
-
-
Anonymous hacker collective hits rural law enforcement
In its latest exploit, global hacker collective Anonymous claimed to release ten GB of stolen data from more than seventy rural sheriff’s departments across the United States, leaking sensitive information that could compromise the agencies’ investigations
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.