-
UK.gov's G Cloud may have security silver lining after all
Cloud computing offers many benefits, but enhanced security is not one of them — or is it? An expert says that the emergence of cloud computing is making it possible to take a new approach to security; until now, the U.K. government has kept its work on information security in specialist bodies such as GCHQ and CESG, separate from the development of business functions; “The cloud gives us the opportunity to get the specification right before we get too far down the track,” he says
-
-
The personal spy: the smartphone in your pocket may be spying on you, II
The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details
-
-
Growing demand for IT forensics experts
As reliance on the Internet increases, so do Internet-related crimes; the growing need to investigate such crimes and find out the culprits and their methods has increased demand for IT forensics experts
-
-
The personal spy: the smartphone in your pocket may be spying on you, I
The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details
-
-
The Internet to be made more useful for the U.S. military
DARPA awarded Lockheed Martin a $31 million contract to lead a team which will redesign the Internet to make it more suitable for military use
-
-
It's the people, stupid
People are still the weakest link in computer and Internet security, study finds
-
-
Michigan airport turns off Web site over malware risk
The Gerald R. Ford International Airport in Grand Rapids temporarily pulled its site in response to an unspecified malware threat
-
-
DHS's public Web sites vulnerable
DHS’s Inspector General evaluated the nine most popular of the department’s 125 public-facing Web sites, and found that while the component agencies responsible for the Web sites followed DHS policies when setting them up, they left too much to chance afterward
-
-
Home robots may be hackers' next target
Home surveillance robots could be turned against their users, researchers say; few people have home robots now, but reliance on them grows for stay-at-home elderly and the sick
By
-
-
UN: Next world war may be in cyberspace
Countries have become critically dependent on technology for commerce, finance, health care, emergency services, and food distribution; “Loss of vital networks would quickly cripple any nation, and none is immune to cyberattack,” expert says
-
-
How far should government go to make the Web secure?
If hackers take over a nuclear plant’s control system, should the president order the computer networks shut down? If there is a terrorist attack, should the government knock users off other computer networks to ensure that critical systems stay online? Should the government be able to dictate who companies can hire and what they must do to secure the networks that affect Americans’ daily life?
-
-
The day of military smart phones nears
It is only a matter of time before we see military-related iPhone apps; the iPhone can use thousands of programs, and some of these are very useful for military personnel; officers see how useful the iPhone could be with software designed for military purposes; a military version of the iPhone, able to operate on a closed military network, would be a big help in the combat zone
-
-
The good vs the bad hackers
Ethical hackers met in the 14th Hacker Halted global conference to discuss how best to thwart the nefarious activities of bad hackers
-
-
DHS to hire 1,000 cyber experts
The White House told DHS it could be more competitive and choosy as it hires up to 1,000 new cyber experts over the next three years; move is part of U.S. efforts to beef up cyber security
-
-
Denying denial-of-service attacks
Denial of Service (DoS) and distributed Denial of Service (DDoS) attacks involve an attempt to make a computer resource unavailable to its intended users; new filtering system could protect networks from such attacks
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.