• UK.gov's G Cloud may have security silver lining after all

    Cloud computing offers many benefits, but enhanced security is not one of them — or is it? An expert says that the emergence of cloud computing is making it possible to take a new approach to security; until now, the U.K. government has kept its work on information security in specialist bodies such as GCHQ and CESG, separate from the development of business functions; “The cloud gives us the opportunity to get the specification right before we get too far down the track,” he says

  • The personal spy: the smartphone in your pocket may be spying on you, II

    The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details

  • Growing demand for IT forensics experts

    As reliance on the Internet increases, so do Internet-related crimes; the growing need to investigate such crimes and find out the culprits and their methods has increased demand for IT forensics experts

  • The personal spy: the smartphone in your pocket may be spying on you, I

    The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details

  • The Internet to be made more useful for the U.S. military

    DARPA awarded Lockheed Martin a $31 million contract to lead a team which will redesign the Internet to make it more suitable for military use

  • It's the people, stupid

    People are still the weakest link in computer and Internet security, study finds

  • Michigan airport turns off Web site over malware risk

    The Gerald R. Ford International Airport in Grand Rapids temporarily pulled its site in response to an unspecified malware threat

  • DHS's public Web sites vulnerable

    DHS’s Inspector General evaluated the nine most popular of the department’s 125 public-facing Web sites, and found that while the component agencies responsible for the Web sites followed DHS policies when setting them up, they left too much to chance afterward

  • Home robots may be hackers' next target

    Home surveillance robots could be turned against their users, researchers say; few people have home robots now, but reliance on them grows for stay-at-home elderly and the sick

    By

  • UN: Next world war may be in cyberspace

    Countries have become critically dependent on technology for commerce, finance, health care, emergency services, and food distribution; “Loss of vital networks would quickly cripple any nation, and none is immune to cyberattack,” expert says

  • How far should government go to make the Web secure?

    If hackers take over a nuclear plant’s control system, should the president order the computer networks shut down? If there is a terrorist attack, should the government knock users off other computer networks to ensure that critical systems stay online? Should the government be able to dictate who companies can hire and what they must do to secure the networks that affect Americans’ daily life?

  • The day of military smart phones nears

    It is only a matter of time before we see military-related iPhone apps; the iPhone can use thousands of programs, and some of these are very useful for military personnel; officers see how useful the iPhone could be with software designed for military purposes; a military version of the iPhone, able to operate on a closed military network, would be a big help in the combat zone

  • The good vs the bad hackers

    Ethical hackers met in the 14th Hacker Halted global conference to discuss how best to thwart the nefarious activities of bad hackers

  • DHS to hire 1,000 cyber experts

    The White House told DHS it could be more competitive and choosy as it hires up to 1,000 new cyber experts over the next three years; move is part of U.S. efforts to beef up cyber security

  • Denying denial-of-service attacks

    Denial of Service (DoS) and distributed Denial of Service (DDoS) attacks involve an attempt to make a computer resource unavailable to its intended users; new filtering system could protect networks from such attacks