-
Canada focused on new cybersecurity strategy
Ottawa is developing a new cybersecurity strategy in light of repeated incursions into the country’s key computer networks
-
-
Aussie government in $43 billion fast Internet scheme
The economic slowdown found private Australian telecommunication companies unwilling to fund a high-speed national broadband network, a network which Kevin Rudd’s government believes is essential for the country’s economic competitiveness; the government is stepping in, saying it would invest at least $21.9 billion of taxpayers’ money to get the project going
-
-
Fighting cyber attacks costs Pentagon $100 million
The U.S. Department of Defense and military are subject to constant cyber attacks against their networks; the cost of repairing the damage of such attacks — manpower, computer technology, and contractors hired to clean up after both external probes and internal mistakes — is $100 million a year
-
-
Hackers of U.S. electrical grid left behind "sleeper" software programs
The U.S. electrical grid has been penetrated by sophisticated hackers who left behind “sleeper” software programs which could be remotely activated to disrupt the system; the intelligence community says it is the work of Russian and Chinese government operatives
-
-
U.K. Home Office terrorism advisory site offered link to a porno site
On Monday, a new EU regulation went into effect mandating that ISPs store details of user e-mails and Internet calls; a Home Office site contained a link for citizens who felt the measure was too intrusive, and who would want to send the Home Office a complaint about it; trouble is, those who clicked on the link were sent to a Japanese porno site
-
-
Aussie company targets CCTV market for its encryption technology
Melbourne-based network encryption company Senetas Corporation, a leading developer of encryption products, said the growing CCTV market, still in its infancy as far as security is concerned, offers its encryption solutions an attractive opportunity
-
-
U.S. cybersecurity law to give feds unprecedented Internet control
Lawmakers draft legislation giving the U.S. government unprecedented authority over the U.S. critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies; the legislation is intended to protect a broad range of the U.S. infrastructure — including networks for the country’s banking industry, utilities, transportation, and telecommunications — from cyber attacks
-
-
U.S. legislators supports creation of cybersecurity czar
Vowing to prevent Cyber Katrina, U.S. senators propose cyber czar
-
-
Dubious distinction: U.S. produces most cybercriminals -- and victims
Cybercriminals defrauded victims out of an estimated $265 million, with the average victim losing about $1,000; two out of three cybercriminals — and 93 percent of victims — were Americans
-
-
New DHS security tool to detect Conficker worm
Conficker had been programmed to reach out to 250 Web sites daily to download commands from its masters — but tomorrow it will begin connecting with 50,000 Web sites daily for instructions
-
-
Chemical company wants to limit disclosure on plant explosion
An explosion in a chemical plant in West Virginia plant killed two employees and raised fears about the safety of chemical plants located near residential areas; the plant owner, citing a terrorism-related federal law, is trying to limit what the federal chemical safety agency can disclose to the public
-
-
The notion that cybercrime exceeds drug trade is a myth
The number of $1 trillion — as in “cybercrime now generates $1 trillion a year for cybercriminals” — appears to be a myth, even it if is repeated by IT security and communication companies
-
-
Denmark, Sweden ahead of U.S. in new global IT report
Denmark and Sweden are better than the United States in their ability to exploit information and communications technology; this good news for the United States: it climbed one spot from No. 4 in 2007 to No. 3, and the report says the United States was well placed for a technology-driven recovery as it has the top scientific research institutions in the world and best collaboration between universities and industries
-
-
Taliban continue campaign against cellular service in Waziristan
Taliban and al-Qaeda militants believe that the CIA and U.S. military rely on cellular communication intercepts to track and kill members of the two organizations; Taliban leaders warned Pakistan not to expand the cellular network in the areas under Taliban control; those networks already in place must be shut down overnight
-
-
Video on beyond line-of-sight high-bandwidth connection possible
Boeing demonstrates that transmitting video on beyond line-of-sight high-bandwidth connection is possible
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.