-
New Facebook app monitors users' social circle for danger
How long will it be before it is impractical to use Facebook without a dedicated app to protect you from spammers and scammers? New app scans your wall, inbox, and any comments on your profile for malicious links that might lead to sites that try to install malware or hijack your account details. It also checks your privacy settings and offers reminders and tips on how much you are sharing and how to change those settings
-
-
Using Facebook to nab a Facebook killer
Suffolk County police are using Facebook to solve a murder which appears to have been related to Facebook; a 31-year old woman was found dead; the police searched her Facebook page, and found two individuals with whom she had recently been in contact; one of them was using her credit cards after her death; the police has now created a page seeking information about the man, looking to arrest him
-
-
Symantec: Stuxnet targeted Iran's uranium enrichment program
Symantec says Stuxnet worm aimed to disrupt electrical motor controls, like those used by gas centrifuges to enrich uranium; Stuxnet, considered by many security researchers to be the most sophisticated malware ever, targeted Windows PCs that managed large-scale industrial-control systems in manufacturing and utility companies
-
-
U.S. Internet hosts are essential for criminal botnets
Cybercrime is often associated with Russia and China, and rightly so — but many of the servers vital to their activities are located elsewhere; facilities provided by Internet companies in the United States and Europe are crucial to these criminal gangs’ activities
-
-
Law enforcement agencies dig deeper into applicants' digital past
More and more police departments are digging deep into the social media accounts of applicants, requesting that candidates sign waivers allowing investigators access to their Facebook, MySpace, YouTube, Twitter, and other personal spaces; some agencies are demanding that applicants provide private passwords, Internet pseudonyms, text messages, and e-mail logs; of “particular concern” to law enforcement agencies is that defense lawyers could use officers’ posts to undercut their credibility in court
-
-
Best 300 U.S. student hackers compete for cybersecurity scholarships, prizes
The seventh Annual Cyber Security Awareness Week competition at the Polytechnic Institute of New York University; 120 teams from high schools across the country — consisting of 300 of the U.S. best student hackers — competed under the watchful eyes of representatives from the CIA, NSA, DHS, and NSA; the students compete for scholarships and prizes by solving simulated security crises likely to emerge in an increasingly wired world
-
-
Sector Report for Thursday, 11 November 2010: Cybersecurity
This report contains the following stories.
-
-
Cybersecurity standard published to protect global critical infrastructure
With industrial networks being increasingly connected to the hostile IT world, and the frequency and sophistication of malware growing exponentially, industrial stakeholders must act today to protect their critical systems; the International Instrument Users Association (WIB) releases comprehensive cybersecurity standard to protect critical industrial computers;
-
-
The time for cybersecurity contracting is now
It is not just a fad: cybersecurity represented the largest request for funds in last year’s intelligence budget; it is an area for expansion government contractors cannot afford to pass up
-
-
Second round of CyberPatriot competition sees 80 teams advance
CyberPatriot, an education initiative produced by AFA to inspire students to consider science, technology, engineering, and mathematics fields in their studies, completed a second round of competition; nearly 400 teams registered in the All-Service Division, and approximately 80 teams scored high enough to compete again come 4 December; teams raced against time and their opponents quickly to find and effectively correct vulnerabilities in a virtual network
-
-
Keystroke biometric solution will protect against hacking
Virginia Tech researchers develop an authentication framework called “Telling Human and Bot Apart” (TUBA), a remote biometrics system based on keystroke-dynamics information; the technology will prevent hackers from using a computer program designed to produce keystroke sequences in order to spoof more conventional security systems
-
-
Sector Report for Thursday, 28 October 2010: Cybersecurity
This report contains the following stories.
Plus 1 additional story.
-
-
Cybersecurity bill not likely to pass this year
In an effort to give the president the power to combat any pending or existing cyber threat that could threaten critical infrastructure around the country, some lawmakers are looking to pass a new legislation that would give the president power to shut down some sections of the Internet during an attack or under the threat of an attack; the bill is not likely to pass in the Congress
-
-
Cybersecurity only bright spot among disappointing administration privacy grades
The Electronic Privacy Information Center (EPIC) gave the Obama administration a “B” grade on its cybersecurity efforts; the 2010 report card shows declining grade — relative to 2009 — for the administration efforts in the cyber privacy areas; EPIC gave President Obama a dismal “D” on civil liberties in 2010, compared to a “C+” in 2009
-
-
PwC recruits cybersecurity talent with online puzzles
PricewaterhouseCoopers (PwC) found a new way to recruit IT security professionals; it aimed to dig out U.K. talent hidden under the radar by settling up tests for hackers at different levels of ability, uncovering teenagers and people already working in the IT profession; PwC says that winning these cyber contests is typically an indication of good problem solving, curiosity to learn, and a driven work ethic
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.