• Here they go again: China demands access to Western computer security

    Another crisis in U.S.-China trade relations looms, as China, again, is about to introduce rules which would allow Chinese companies to steal Western industrial secrets, and would allow the Chinese government more tightly to monitor what the Chinese people say and read

  • DSL routers vulnerable to malware attacks

    New reports says DSL modems are susceptible to attacks more typically associated with Web sites: Hackers can insert malware onto the victim’s computer or recruit the computer as a bot for a botnet

  • Day of 4G technology -- mobile WiMax -- nears

    Clearwire and Sprint Nextel completes transaction to combine their next-generation wireless Internet businesses; companies announce $3.2 billion investment to launch 4G mobile Internet company

  • European states to coordinate anti-cybercrime effort

    The 27 member states of the EU are worried about the effects of cyber crimes on the European economy; new blueprint for fighting cybercrime calls for better cooperation among national law enforcement units

  • Russian hackers attacked U.S. Central Command's networks

    Russian hackers have been the prime suspects in sustained attacks on government networks and Web sites in Estonia and Georgia; now evidence emerges to implicate Russian hackers in sustained attacks on the computer system of the U.S. Central Command, which oversees the wars in Iraq and Afghanistan

  • Making cloud computing safer

    As the cost and other benefits of cloud computing become apparent, more and more companies move parts of their infrastructure out of their data centers; there is a need, though, to think long and hard about disaster-proofing the cloud

  • Briefly noted

    IT to get more attention in approval process for political appointees… More U.S. hospitals turn to palm biometircs for patient identification

  • New CFIUS regulations

    CFIUS issues final regulations governing national security reviews of foreign investment in the United States

  • Queen's University nets £25 million funds for cybersecurity research

    Belfast’s Queen University receives funding to open the new Center for Secure Information Technologies (CSIT) which will do research in areas including data encryption, network security, wireless security, and “intelligent surveillance technology”

  • Panel calls on Obama to appoint a cybersecurity czar

    CSIS panel urges the incoming president to elevate handling of cyber security issues to the White House and not leave them with DHS, which is the current leader on these issues

  • Encryption breakthrough: new way to generate random numbers

    Encryption depends on random numbers, but generating random numbers is not easy; existing devices, which can typically only produce 10s or 100s of megabits of random numbers per second; researchers show new method that can generate truly random sequences at up to 1.7 gigabits per second

  • Experts: Internet crime might cause global catastrophe

    Damage caused by cyber crime is estimated at $100 billion annually; tech-savvy gangs from China, India, Eastern Europe, and Africa were coming up with ever more sophisticated ways of swindling money from vulnerable people

  • Searching for new Internet security standard

    Cryptographers compete to define a new Internet security standard; this is necessary because the current standard — the Secure Hash Algorithm 2 (SHA-2) — is starting to show its age

  • Security alliance calls financial incentives for cyber security

    The Internet Security Alliance calls for the incoming Obama administration and Congress to give information technology companies financial incentives for improving cybersecurity defenses, including providing funding in research and development and shielding them from liability caused by cyberattacks

  • Briefly noted

    Obama administration looks to fill more than 300 IT positions… Larger inmate population is boon to private prisons… More attacks on critical infrastructure?