• Game lets players try their hand at computer security

    A new game — Control-Alt-Hack — gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats; the game’s creators will present it this week in Las Vegas at Black Hat 2012; educators in the continental United States can apply to get a free copy of the game while supplies last; it is scheduled to go on sale in the fall for a retail price of about $30

  • ElcomSoft, Pico Computing show world's fastest password-cracking solution

    Pico Computing manufactures a range of high-end hardware acceleration platforms, offering a computational equivalent of more than 2,000 dual-core processors in a single 4U chassis; ElcomSoft updates its range of password recovery tools, employing Pico Field Programmable Gate Array (FPGA)-based hardware to accelerate the recovery of passwords

  • Novel network model to help in cyberwarfare, conservation, and disease prevention

    Computer networks are the battlefields in cyberwarfare, as exemplified by the U.S. recent use of computer viruses to attack Iran’s nuclear program; researchers develop a computer model which could help military strategists devise the most damaging cyber attacks as well as guard America’s critical infrastructure

  • Military-grade mobile security for commercial markets

    Cummings Engineering announced the release of SecureMobile 1.0, powered its proprietary SAIFE encryption technology

  • New book confirms Israel behind killing of Iran nuclear scientists

    A book to be published today offers details about, Israel’s campaign to take out Iranian nuclear scientists, a campaign which is part of the Israel’s broader effort to prevent Iran from acquiring nuclear weapons; the book also says that the cyber campaign against Iran’s nuclear program was an Israeli innovation, not an American one as recently reported; it was the brainchild of Israel’s military intelligence agency (AMAN) and Unit 8-200 — Israel’s equivalent of the eavesdropping, code-breaking National Security Agency (NSA) — and endorsed by the White House at Israel’s suggestion

  • ACLU-sponsored app keeps police accountable

    A new app from the ACLU of New Jersey allows people securely and discreetly to record and store interactions with police, as well as provide legal information about citizens’ rights when interacting with the police

  • New Facebook app detects pedophiles, criminals

    Researchers have developed a new privacy solution for Facebook; the Social Privacy Protector (SPP), developed by Ben-Gurion University of the Negev (BGU) undergraduate students, can help parents adjust their children’s profiles in one click, prevent criminals from gathering valuable personal information, and keep teens safe from pedophiles

  • Mobile device necessitate “stateless” IT security architecture

    I n a new report, Forrester analysts say that to stay ahead of evolving mobile business requirements, security and risk (S&R) and infrastructure and operations (I&O) executives cannot rely on the old approach of end-to-end control over the data path, device, and applications; instead, they must embrace a “stateless” architecture in which IT decouples security controls from the devices and the infrastructure, derives trust dynamically, and avoids costly new investment of in-house applications and infrastructure

  • Sharp increase in cyberattacks on U.S. critical infrastructure

    The number of reported cyberattacks on U.S. critical infrastructure increased sharply – from 9 incidents in 2009 to 198 in 2011; water sector-specific incidents, when added to the incidents which affected several sectors, accounted for more than half of the incidents; in more than half of the most serious cases, implementing best practices such as login limitation or properly configured firewall, would have deterred the attack, reduced the time it would have taken to detect an attack, and minimize its impact

  • Infrastructure security market to reach $32.55 billion in 2012

    The global infrastructure security market, in terms of government spending, will reach a value of $32.55 billion in 2012; a new report says that spending on bolstering the cyber aspects of infrastructure security has little utility by itself unless the physical integrity of the infrastructure is also appropriately safeguarded

  • First successful "spoofing" of UAVs demonstrated

    A research team successfully demonstrated for the first time that the GPS signals of an unmanned aerial vehicle (UAV), or drone, can be commandeered by an outside source — a discovery that could factor heavily into the implementation of a new federal mandate to allow thousands of civilian drones into the U.S. airspace by 2015

  • DHS FY2013 $5.75 billion IT budget request focuses on mobility, data center consolidation

    DHS FY2013 IT spending requests are roughly even with FY2012 levels, with emphasis on commodity IT, mobility, and data center consolidation; the overall 2013 DHS budget request is just under $40 billion; the department’s IT budget request is just over $5.75 billion; down from $5.79 billion in FY2012

  • DHS awards Unisys IT services contract with a total potential value of $3 billion

    Unisys among thirty companies to compete for task orders for infrastructure support and operations and maintenance services under $3 billion contract; Unisys shares were trading sharply higher Wednesday morning after the company released the news about the contract

  • nCircle’s new solution offers coverage for six SCADA suppliers

    Critical infrastructure is designated by DHS and the North American Reliability Corporation (NERC) as the assets, systems, and networks so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, and public health or safety; nCircle offers a security solution which covers vulnerabilities from six SCADA equipment suppliers

  • FTC charges businesses exposed sensitive information on P2P file-sharing networks

    The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems