• Need for digital security spurs growth of cyber security field

    The growing need for digital security has made the shortage of cyber security professionals in the United States even more apparent, and the U.S. government is now engaged in a campaign to train, hire, and retain thousands of cyber professionals; the private sector is doing its share, too: Raytheon initiated the MathMovesU program in 2005, to inspire middle school students to consider math, science, and engineering education and careers; Raytheon awards more than $2 million annually in scholarships and grants to students, teachers, and schools nationwide

  • Commercial quantum cryptography vulnerable to attack

    Quantum cryptography is one of the most secure known means of transmitting data; in fact, it is often described as “unbreakable” because it relies on the Heisenberg uncertainty principle — observation causes perturbation: if a third party does intercept a quantum signal, this very interception changes the encryption key, making the tampering apparent to parties at both ends; researchers, though, developed and tested a technique exploiting imperfections in quantum cryptography systems to implement an attack

  • view counter
  • India gives BlackBerry reprieve, saying Google, Skype are next

    BlackBerry users in India have received a 60-day reprieve: RIM has offered the Indian government a solution to interception issue (the Indian government wants to have the ability to intercept BlackBerry communications), and the government says it will examine the offer during the next two months; the government also said that services offered by Google and Skype are next, but unlike BlackBerry, Skype and Google Talk are both encrypted end-to-end, so intercepting communications is extremely difficult

  • U.S. intensifies campaign to train, hire, retain cybersecurity professionals

    The cyber threats to both government and public network intensify, and the U.S. federal agencies must find ways to attract qualified workers and develop new skills internally; NIST’s Dr. Ernest McDuffie: “We’ve got a problem of where the next generation of engineers are going to come from— Awareness, education, workforce, and training all have to come together”

  • U.S. military wants to cyber-protect critical infrastructure

    The U.S. military wants to exert more influence over the protection of power grids, transportation networks, and financial network systems because the military relies on these networks to deal with suppliers and these networks could become military targets

  • RIM proposes industry encryption forum to demands for access to e-mail, messages

    RIM has proposed that an industry forum be established to help governments manage lawful intercept, in the hope of forestalling India’s threatened ban, due this coming Wednesday; the proposed body would be led by RIM, but the company is hoping that others companies threatened by bans — Google, Skype, and others — will join in

  • Pentagon describes 2008 attack as a "network administrator's worst fear"

    The Pentagon admits that a 2008 cyber attack on the Pentagon’s computers was a “network administrator’s worst fear”; a USB device was
    plugged into a military laptop located on an undisclosed base in the Middle East, causing a malicious code to link highly sensitive machines to networks controlled by an unnamed foreign intelligence agency

  • Intel wants security built directly into silicon

    A consensus is emerging that the main reason for Intel’s acquisition of McAfee is that Intel wants to build directly into its hardware the kind of security features more traditionally provided by software like McAfee’s

  • Technological challenges to Intel's embedded security approach

    Embedding security in silicon faces many challenges, among them: how much can be placed into a chip, and the fact that patching hardware or firmware is when a security vulnerability is discovered, is much harder than patching software

  • Powerful GPU processor puts password security system at risk

    A readily available piece of hardware, a graphics processing unit (GPU) costing only a few hundred dollars, now brings supercomputer-level power to any desktop; this new capability puts power into many hands — and could also threaten the world’s ubiquitous password-protection model because it enables a low-cost password-breaking technique that engineers call “brute forcing”

  • The reason for Intel's acquisition of McAfee

    The merger between the two companies takes place ahead of the release in 2011 of new — and as yet undisclosed — products developed by a joint venture the two companies have operated in the past eighteen months; those undisclosed products may be part of the reason why Intel decided to purchase McAfee instead of extending or expanding the two companies’ joint venture; says one analyst: “If what came out of that joint venture was revolutionary it could be that Intel wanted to lock that [intellectual property] down”

  • Intel acquires McAfee for $7.68 billion

    Intel says security is now a fundamental component of online computing, but today’s approach to security is not adequate for the growing availability of Internet connections on mobile phones, medical devices, ATMs, automobiles, and elsewhere; the industry needs a new approach that combines software, hardware, and services to meet tomorrow’s needs

  • Shop Shield privacy protection expanded to IE browser

    Experts say that the best way to assure the safety of financial and personal identifying information (PII) transmitted on the Internet, and prevent it from being lost, stolen, or misused, is to keep it private by not transmitting it to Web sites in the first place; Shop Shield allows consumers to engage in commercial transactions on the Web without giving these Web sites information such as e-mail addresses, passwords, usernames, phone numbers, billing addresses, credit card numbers, or other user payment information; Shop Shield even allows consumers to do business on the Web without giving out their names

  • House Cybersecurity Caucus launches new Web site

    Billions of dollars are spent on cybersecurity; the House cybersecurity caucus has launched a new Web site, and observers say it could provide a valuable public service if it helps aggregate disparate activities and acts as a Federal cybersecurity information hub