Cybersecurity

  • The day of military smart phones nears

    It is only a matter of time before we see military-related iPhone apps; the iPhone can use thousands of programs, and some of these are very useful for military personnel; officers see how useful the iPhone could be with software designed for military purposes; a military version of the iPhone, able to operate on a closed military network, would be a big help in the combat zone

  • The good vs the bad hackers

    Ethical hackers met in the 14th Hacker Halted global conference to discuss how best to thwart the nefarious activities of bad hackers

  • DHS to hire 1,000 cyber experts

    The White House told DHS it could be more competitive and choosy as it hires up to 1,000 new cyber experts over the next three years; move is part of U.S. efforts to beef up cyber security

  • Denying denial-of-service attacks

    Denial of Service (DoS) and distributed Denial of Service (DDoS) attacks involve an attempt to make a computer resource unavailable to its intended users; new filtering system could protect networks from such attacks

  • TECHEXPO - Exclusive Security-Cleared Hiring Events - Register Now!
    view counter
  • Experts offer insights on current security issues

    Attendees at the ASIS annual event were offered the latest insights into the latest thinking on a range of security issues, from protecting the hospitality industry to protecting house of worship, and much more

  • Open-System Vendors demo IP interoperability

    Exacq Technologies, Firetide, IQinVision, and Pivot3 are showing how standards-based solutions from open-system vendors can be integrated and supported in the field

  • Improving home computer security

    Researchers have developed a specification for security policy on home networks that can guarantee reliability and availability; the specification also takes into account authentication, authorization, security policy deployment so that all users in the home are not only protected from malware but also can help ensure everyone can use the network when they need to

  • Malware lingers on for months on infected PCs

    New study says that if computer systems are not disinfected quickly after infection, then infection tends to linger around indefinitely, possibly until the point users exchange compromised boxes for new machines

  • U.S. government takes leap into the Internet cloud

    Vivek Kundra, the White House CIO, said wider adoption of cloud computing solutions would allow federal agencies to “fulfill their missions at lower cost, faster, and ultimately, in a more sustainable manner”

  • How cloud computing can help the U.S. government -- and citizens

    The administration has seen benefits in the way private industry uses cloud computing, and intends to mirror these benefits; ultimately, the idea is to make it simple for agencies to procure the applications they need

  • U.S. Government recommends weighing laptop before and after visit to China

    The U.S. government urges travelers to follow extremely strict policies for visits to China which extend far beyond standard software protection; the policies encourage them to leave their standard IT equipment at home and to buy separate gear only for use in China

  • Swayze's death, Williams's outburst, exploited to serve up fake anti-virus

    Cyber criminals exploit the interest of people in breaking news by creating Web sites designed to rip off users searching for more information; surfers visiting these sites are warned of non-existent security problems in a bid to trick them into buying software of little or no utility

  • Cyber criminals go after small businesses

    Small and medium-sized businesses that do not have the resources to keep updating their computer security; cybercriminals find it easier to target such businesses

  • Cocoon Data: Securing Internet communication

    Cocoon Data’s Secure Envelopes is a way of electronically “wrapping” sensitive files, e-mail attachments, and other data to keep them from being seen by unintended eyes

  • FCC releases report on agency's preparedness for major emergencies

    The FCC has an important role to play in ensuring that the U.S. communications infrastructure serves the public safety needs; a new report concludes that the agency largely meets this challenge, but that there are a few area where matter can be improved