• DHS warns of critical vulnerabilities in Chinese software

    Last week DHS warned that control software widely used in China’s weapons systems, utilities, and chemical plants has dangerous weaknesses that leave it open to hackers; the warning, issued by the DHS Industrial Control Systems Cyber Emergency Response Team (ISC-CERT), stems from critical vulnerabilities found in SCADA software developed by Beijing’s Sunway ForceControl Technology

  • Teenage hacker brings down British law enforcement agency's website

    A nineteen year old has been arrested by British authorities for attacking the website of the Serious Organized Crime Agency (SOCA); the teenager has also been charged with bringing down the websites of the International Federation of the Phonographic Industry and the British Phonographic Industry; the FBI worked in conjunction with British investigators; authorities believe the hacking group LulzSec is behind the attacks

  • Weather variations cost U.S. $485 billion a year

    New research finds that routine weather events such as rain and cooler-than-average days can add up to an annual economic impact of as much as $485 billion in the United States; the study found that finance, manufacturing, agriculture, and every other sector of the economy is sensitive to changes in the weather, and that the impact of routine weather variations on the economy is as much as 3.4 percent of U.S. gross domestic product

  • China's sustained cyberattacks on U.S. are an economic, strategic threat

    China has been engaged in a sustained guerrilla cyber war against the United States, with two goals in mind: first, stealing research and development, software source code, manufacturing know-how, and government plans; second, to counter American military superiority by threatening to damage the underpinning of the U.S. economy; that Congress and the administration do nothing in the face of these cyber assaults is puzzling

  • Turkey apprehends 32 Anonymous hackers, group vows retaliation

    In the continuing crackdown against the international hacking ring known as Anonymous, Turkey has apprehended thirty-two individuals suspected of online cyber attacks against government websites; Turkish officials made the arrests following a cyber attack on the government’s telecommunications agency’s website; officials feared that the group would strike again during national elections; undeterred by the arrests, Anonymous announced that it would resume its attacks on Tuesday night

  • Three arrested in PlayStation cyberattacks

    On Friday, Spanish law enforcement officials arrested three men suspected of hacking into Sony’s PlayStation Network in addition to other major government and corporate websites around the world; the three men are suspected of being the local leaders of a secretive group of international hackers that call themselves Anonymous; the group has claimed responsibility for several high profile attacks on major sites like YouTube, Amazon, the Australian Parliament’s House website, and PayPal

  • Pentagon outlines use of cyber weapons

    The Pentagon has developed a list of approved cyber weapons and tools along with parameters for their use; official says the classified list of cyber capabilities has been in use for several months and has been approved by several government agencies; the framework clearly delineates what capabilities can be used, in what circumstances, and when actions need presidential approval; a cyber weapon like Stuxnet can only be used with presidential authorization even if it were to be deployed in a country with which the United States was openly at war

  • Imation acquires MXI Security

    The cost of data breaches continues to rise annually, with the average organizational cost of a breach reaching $7.2 million in 2010; by 2014, the market for secure data solutions — protecting against data loss, theft, or breach — specifically designed to address secure portable storage, digital identity, and secure portable computing is expected to reach more than $4.5 billion; Imation, a major player in the field of secure data, further strengthens its offerings by acquiring the assets of MXI Security; the move is a continuation of Imation’s strategy of investing in key technology platforms to meet customers’ needs

  • FBI leads Lockheed Martin cyberattack investigation

    The FBI recently announced that it is leading a federal investigation into a cyberattack on defense giant Lockheed Martin’s networks; the investigation will be led by the National Cyber Investigative Joint Task Force and is aimed at determining if the attack was a result of “poor hygiene, if nothing was infiltrated and nothing taken or something more”; on 21 May, the company detected a “significant and tenacious” attack on its networks that was met with a swift response; the FBI declined to comment on what actions it would take if the investigation revealed that the attacks were perpetrated by state or non-state actors

  • Hackers using cloud networks to launch powerful attacks

    In a disturbing new trend, hackers have begun harnessing the vast computing power of cloud based servers to carry out powerful cyber attacks; cloud computing services piece together large strings of online servers and storage systems to provide users with enormous processing power and terabytes of storage space; earlier this year, a German researcher, demonstrated that a cloud server could fire 400,000 passwords a second at a secured Wi-Fi network; in the recent attacks that shut down Sony’s online customer networks in April, hackers used cloud based attacks to disrupt service to roughly 100 million users worldwide

  • U.S. will "view major cyber attacks as acts of war"

    The Pentagon has adopted a new strategy that will classify major cyber attacks as acts of war, paving the way for possible military retaliation; “If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” a U.S. military official said; the move to formalize the Pentagon’s thinking was borne of the military’s realization the United States has been slow to build up defenses against cyber attacks, even as civilian and military infrastructure has grown more dependent on the Internet; the military established a new command last year, headed by the director of the National Security Agency (NSA), to consolidate military network security and attack efforts

  • Data breaches compromise nearly 8 million medical records

    The revelation that millions of people have had their personal medical records stolen could slow the Obama administration’s efforts to digitize the nation’s health care records; in the last two years alone nearly eight million people have had their medical records stolen or compromised; 1.7 million patients, staff members, contractors, and suppliers at several New York hospitals had their information stolen when thieves removed them from an unlocked van; to ensure that medical records are safe, HHS has begun imposing penalties on health care providers who compromise their patient’s records; but some health care experts wonder if enforcing HIPAA alone will be enough to address the problem

  • Digital ants protect critical infrastructure

    As the U.S. electrical power grid becomes more interconnected through the Internet, the chances of cyber attacks increase as well; a Wake Forest University security expert developed “digital ants” to protect critical networks; unlike traditional security approaches, which are static, digital ants wander through computer networks looking for threats such as computer worms, self-replicating programs designed to steal information or facilitate unauthorized use of computers; when a digital ant detects a threat, it summons an army of ants to converge at that location, drawing the attention of human operators to investigate

  • Pentagon to help protect U.S. cyber assets, infrastructure

    The U.S. Defense Department is now sharing cybersecurity information, capabilities, and expertise with DHS; this is in line with the administration’s cyber security plan, which calls for DHS to lead the effort to protect Americans, the U.S. critical infrastructure, and the federal government’s computer networks; the Defense Department would retain protections over its “dot-mil” domain, and it would work in close collaboration DHS and the departments of Justice and Commerce better to safeguard cyberspace

  • DHS to double cybersecurity staff

    DHS recently announced that it plans to increase its cybersecurity workforce by more than 50 percent so that it can lead government-wide efforts to secure federal networks against cyber attacks as outlined in President Obama’s recently proposed cybersecurity plan; DHS plans to hire 140 additional cybersecurity experts by October 2012 bringing the agency’s total to 400; under the president’s proposed legislation, DHS would act as the lead agency in coordinating cybersecurity measures across the government and would also be responsible for ensuring that private operators of critical infrastructure have adequate security measures in place