-
Secure network for critical infrastructure idea draws fire
The Obama administration wants to develop a secure computer network to defend civilian government agencies and critical civilian infrastructure and industries; the restricted network would allow the government to provide greater protection to vital online operations and critical infrastructure — such as financial networks, commercial aviation systems, and the national power grid — from Internet-based attacks; critics say this ambitious idea is impractical
-
-
Experts: Israel used cyber weapon to disrupt Iran's nuclear reactor
The Stuxnet malware has infiltrated industrial computer systems worldwide in July and August; now, cyber security experts say that the worm was, in fact, is a search-and-destroy cyber weapon meant to hit a single target — Iran’s Bushehr reactor; Stuxnet amazed — and stunned — computer security experts: too large, too encrypted, too complex to be immediately understood, it employed amazing new tricks, like taking control of a computer system without the user taking any action or clicking any button other than inserting an infected memory stick; in Stuxnet, the world faces a new breed of malware that could become a template for attackers wishing to launch digital strikes at physical targets worldwide — Internet link not required
-
-
Students think hacking is "cool"
A third of students surveyed thought that hacking was “cool,” and a similar number thought it was “easy”; the survey found that 37 percent had hacked Facebook accounts, 26 percent e-mail accounts, with 10 percent breaching online shopping accounts; an entrepreneurial 15 percent revealed that they hacked to make money
-
-
Google Apps more secure with two-step verification
More and more companies are migrating their e-mail and other cloud services over to Google Apps — but the doubts about whether making such a transition would put company security at risk linger; now the company is doing something about it: Google announced early Monday the availability of two-step verification, a more secure way for Google Apps users to sign into their accounts
-
-
MI5: Cyber espionage on the rise, but can be easily beaten
MI5 says the Internet has made the threat of espionage by foreign countries higher than ever before, but insisted it is “relatively straightforward” to block attempts to steal data; MI5 has previously written to the bosses of big British companies to warn them of the threat online, particularly from hackers with links to the Chinese intelligence services
-
-
Sector Report for Thursday, 16 September 2010: Cybersecurity
This report contains the following stories.
Plus 3 additional stories
-
-
Pentagon lacks effective doctrine to guide cyberwarfare operations
There has been much talk recently about cyber warfare, and the Pentagon has even created a new U.S. Cyber Command — but the GAO says the U.S. Defense Department lacks the doctrine needed effectively to guide cyberwarfare strategies
-
-
Security standards for smart grid evolve
Digital technology in the smart grid measures and distributes the delivery of electricity to consumers and has the potential to reduce energy use and costs for consumers as it’s deployed in more areas of the country; security experts say, however, that the new network will offer new avenues for criminals to infiltrate, corrupt and steal data
-
-
U.K to increase spending on cybersecurity
U.K. defense minister that cuts in information security spending are not on the agenda for the Strategic Defense and Security Review (SDSR), which is due to report back in the autumn; on the contrary, Britain is looking to boost its capabilities in the area
-
-
Vulnerable IT infrastructure means loss of revenue
Europeans businesses are losing approximately 17 billion Euros a year in revenue owing to IT disruptions; on average, European businesses suffer IT failures lasting an average of fourteen hours per company a year, amounting to nearly one million hours of down-time costs
-
-
GTEC buys Zytel, bolstering cyber, intelligence capabilities
GTEC pays $26.8 millions in cash for Maryland-based Zytel; little is known about Zytel’s actual products — all the company’s work is classified and all employees are cleared at the Top Secret/Sensitive Compartmented Information level — but it develops cybersecurity and mission systems in support of the critical intelligence, counterterrorism, and cyber-warfare missions of its national-security clients
-
-
The most pressing cybersecurity issue
According to Red Hat’s Gunnar Hellekson the most pressing cybersecurity issue is “the threat that comes from our reactions to real and perceived threats…I see this growing ‘Fortress America’ movement around computer security and the security of the software-supply chain”
-
-
HP to buy security software company ArcSight for $1.5 billion
Hewlett-Packard agreed to buy security software company ArcSight for $1.5 billion; ArcSight’s software helps companies protect their digital assets from cyber attacks and fraud, and aids in regulatory compliance. While many analysts said HP overpaid, they also said the deal fits with its broader enterprise strategy. Some, though, questioned the company’s financial discipline; the deal is the latest in a rash of consolidation in the security technology sector; last month, Intel Corp agreed to buy McAfee for $7.7 billion, and in May, Symantec Corp bought Verisign Inc.’s payment authentication unit for about $1.3 billion
-
-
EMP threat to U.S. should be kept in perspective
In 1962 the United States conducted a high-altitude nuclear test above Johnston Island, 825 miles southwest of Hawaii; detonated 400 kilometers above the island, the resulting nuclear blast knocked out street lights across Hawaii and tripped circuit breakers, triggered burglar alarms, and damaged a telecommunications relay facility on the island of Kauai; could terrorist, or a nuclear-armed rogue state, launch an EMP Pearl Harbor against the United States?
-
-
Smartphone security products begin to make it to market
A modern smartphone has many of the same capabilities as a PC and is way more vulnerable to certain kinds of attack; even so, few smartphone users see security apps as essential; Austrian security testing lab AV-Comparatives has justreleased a study comparing four smartphone security products
-
More headlines
The long view
What Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?
While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.
Confronting Core Problems in Cybersecurity
It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul —a testament to how disruptive these attacks have become.
Voting from Your Sofa Is Secure Enough – but Will It Be Allowed?
A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.