-
-
Nuance and Appligent team up to secure PDFs
Converting text documents into PDF can open the door to determined thieves; safely redacting information at issue; new add-on software securely scrubs files for lists of redacted words and phrases
-
-
IBM predicts rise in security threats in 2007
Newly released Vista operating system a ripe target for malicious hackers; fuzzer attacks demonstrate a growing sophistication among the black hat set; IBM’s Internet Security System’s X Force Team pessimistic about the future
-
-
Leading data security companies form payment card securty alliance
Despite all the press on data security breaches and the corporate and personal costs which these breaches entail, there is still only limited awareness of the PCI data security standards; eight leading data security companies form an alliance to change that
-
-
NIST opens competition to improve SHA-1 encryption standard
Recent efforts by Chinese researchers show that decades-old encryption system is increasingly vulnerable; competition is open to all, and winning bid will support 224-, 256-, 384- and 512-bit key encryption, with a maximum message length of at least 264 bits
-
-
-
Yoggie Security Systems raises $1 million
Innovative data protection company offers network security for mobile devices: Yoggie Gatekeeper physically isolates laptops from incoming Internet threats; if an attack is successful, Yoggie Gatekeeper is hit first and will not allow further damage to the laptop
-
-
IT spending worldwide to rise to $1.48 trillion by 2010
More and more is being spent on IT: In 2006 organizations and consumers spent $1.16 trillion, and during the next thee years this number will grow at a CAGR of 6.3 percent
-
-
UPDATE: NNSA chief fired for Los Alamos security lapses
Linton Brooks gets the axe after a series of breaches expose the weakness of lab cyber-security; failure to do away with removable storage devices in weapons-related computers cited; Energy Department starts the hunt for a replacement
-
-
Netcentrics teams with L3 to secure Army HQ's computers
Virginia company deploys a enterprise-wide common cryptographic log-in using common access cards; effort part of the Information Management Center project
-
-
Cybercrooks use "KGB-style" recruitment tactics
Phishers and hackers are infiltrating university clubs; greed a prime motivator for students; liberal arts majors trained to become sleeper cells
-
-
White papers sought to describe the human factor in cyber-insecurity
Cyber Security Knowledge Tranfer Network offers £50,000 to winning “human factors working group”; understanding how phishers and hackers exploit psychology a critical endeavor; winning applicants will devise a method that raises awareness, has little cost, and builds demand for cybersecurity products
-
-
GTSI completes Navy's Prometheus project
$15 million success shows GTSI is back in the saddle after earlier disappointments; effort secured Navy networks against an exponential rise of cyber attacks
-
-
AirDefense sensors to be deployed in FAA LAN security project
Contract won by Simplex Data Solutions will result in the deployment of hundreds of AirDefense wireless sensors; latter company flies high after receiving $14 million in second round funding
-
-
SmartTECH to market Akoura's DataSecure software in India
DataSecure’s clever “obfuscation technology” disguises senstive data as commonplace files; unauthorized users are welcomed into the system, but once there they find nothig of value; “cryptographic data store” hides secure information from the operating system so normal and embedded files look the same on the Properties menu
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.