Cybersecurity

  • Cyber-criminals targeting social networks

    Cyber-criminals are drawn to the wealth of personal information supplied by users of social networks

  • Apple says jailbreaking may knock out transmission towers

    The Electronic Frontier Foundation (EFF) asked the U.S. Copyright Office to instruct Apple to allow “jailbreaking ” — that is, modification of the iPhone’s software without Apple’s approval; Apple responded that modifying the iPhone’s operating system could crash a mobile phone network’s transmission towers or allow people to avoid paying for phone calls

  • Addressing cloud computing confusion

    New report sheds light on federal government cloud computing progress; industry and government are at equal cloud adoption pace

  • Northrop Grumman opens new cybersecurity center

    Northrop opens its Cyber Security Operations Center (CSOC) in suburban Maryland; the center will monitor the company’s more than 105,000 clients and 10,000 servers worldwide; more than 1.5 billion daily cyber events that occur on the Northrop Grumman network

  • Defcon, Black Hat to open this week

    Leading cybersecurity events to open in Las Vegas this week; if you prefer security shows at which the speakers favor black T-shirts and dyed hair over suits and ties, and where goth-attired groupies and script kiddies hunkered over laptops line the hallways at all hours of the night, you should attend

  • U.S. cybersecurity efforts hobbled by shortage of cyber experts

    New study finds that the U.S. government’s ability to cope with the growing wave of cyber attacks on government networks is hampered by shortage of cybersecurity experts

  • U.S. considers cloud security standards

    Cloud computing is gaining among businesses, so the U.S. government says it may step up with a set of cloud-security standards to meet government requirements for protecting sensitive data

  • This product description will self-destruct

    Huskies researchers develop a tool to make online personal data vanish; after a set time period, electronic communications such as e-mail, Facebook posts, and chat messages would automatically self-destruct, becoming irretrievable from all Web sites, inboxes, outboxes, backup sites, and home computers

  • Widespread privacy failings in online social networks

    A Cambridge University study finds serious privacy weaknesses in the way social networking sites are run; those who join such site are often unaware of these weaknesses

  • Junk mailers exploit swine flu

    Junk mailers send unsuspected users a Word document posing as a CDC update on the global spread of swine flu; if users open the document, they release a malicious code

  • DARPA awards Cobham $15 million for wireless network

    DARPA awards Cobham a contract calling for the company to develop low-cost wireless network nodes which support adaptation by means of distributed network processing

  • Google, Microsoft promise new age in cyber-security

    Security-conscious consumers are in the habit of regularly updating their antivirus software; this will soon be unnecessary — this, at least, is the promise of both Microsoft and Google; the two companies’ new operating systems will include built-in, continuously updated defenses against viruses and malware

  • Trend: Businesses increasingly rely on SAS for security

    More and more companies have gravitated toward the idea of “software as a service” (SAS) — using software that is delivered remotely instead of hosted on in-house servers; more and more companies are now offering security products as services — but is it the best approach to security?

  • Raytheon wins $155 million wireless contract

    DARPA awards Raytheon $155 million to provide a military wireless network interoperable gateway

  • New distance record for quantum encryption

    Quantum encryption (or quantum key distribution [QKD]) holds the promise of unbreakable communication encryption; the technology has a weakness, though: the short distance of key distribution; researchers break distribution distance record by distributing keys over a distance of 250 kilometers (it may not look like much, but back in 1992 the record was 32 centimeters)