• DARPA’s program to reveal backdoors, hidden malicious functionality in commercial IT devices

    The scenario is one that information security experts dread: widespread dissemination of commercial technology which is secretly wired to function in unintended ways or even spy on its users; from this vantage point, mobile phones, network routers, computer work stations, and any other device hooked up to a network can provide a point of entry for an adversary; for the Department of Defense this issue is of great concern, and DARPA pland to do something about it

  • Kaspersky Lab working on a secure operating system for critical infrastructure

    Antivirus firmKaspersky Lab is set to make a major contribution to the security of critical infrastructure systems by developing an operating system specifically designed for such systems; the new operating system will protect information used in infrastructure such as nuclear power plants, transportation control facilities, gas and electrical systems,and other  facilities “criticallyimportant” to the economy and well-being of industrialized societies

  • Congressional panel says two Chinese telecom companies pose “national security threat” to U.S.

    A report by the House Intelligence Committee recommended that the U.S. government be barred from doing business with two Chinese telecommunications firms – Huawei and ZTE – and that American companies should avoid buying their equipment; a committee report said the two companies pose a threat to U.S. national security; installing these companies’ technology in U.S. communication network will not only allow these companies, acting on behalf of the Chinese military and intelligence, to steal sensitive national security information and trade secrets of private U.S. companies – it will also allow China to attack and paralyze large portions of U.S. critical infrastructure

  • Scenario-based gaming exercise to improve intelligence analysis

    Raytheon has created a scenario-based gaming exercise to study in depth the intelligence analyst’s tradecraft; the company says the goal is ultimately to help analysts produce the best intelligence products and streamline workflows

  • Obama blocks purchase of U.S. wind farms by Chinese company

    Last Friday President Barack Obama blocked a Chinese company from owning four wind farm projects in northern Oregon; Obama cited security risks for the action, making it the first time in twenty-two years that a U.S. president has blocked a foreign business deal

  • Former L-3 employee guilty of selling weapon secrets to China

    A federal court judge in Newark, New Jersey convicted Sixing Liu on six counts of violating the Arms Export Control Act as well as possessing stolen trade secrets, transporting stolen property, and lying to federal agents; Liu is was convicted of stealing thousands of electronic files detailing performance and design of guidance systems for missiles, rockets, target locators, and unmanned aerial vehicles in 2010

  • U.K.’s first research institute to investigate the science of cyber security

    A new U.K. academic research institute, aiming to improve understanding of the science behind the growing cybersecurity threat, was announced last week; GCHQ, the U.K. intelligence agency, says that the institute, which is funded by a £3.8 million grant, is part of a cross-government commitment to increasing the U.K. academic capability in all fields of cybersecurity

  • Bolstering e-mail security

    On the whole, security is not a primary concern for most day-to-day e-mails, but some e-mails do contain personal, proprietary, and sensitive information, documents, media, photos, videos, and sound files; the open nature of e-mail means that they can be intercepted and if not encrypted, easily read by malicious third parties

  • Storing government records for generations to come

    A White House directive released last week requires that federal agencies adopt systems which will store and manage all electronic records in order to keep them safe and secure for future generations

  • Most cybersecurity incidents in Europe remain undetected or not reported

    In a new report, the EU cyber security agency takes a snapshot of existing and future EU legislation on security measures and incident reporting; the analysis underlines important steps forward, but also identifies gaps in national implementation, as most incidents are not reported

  • New book confirms Israel behind killing of Iran nuclear scientists

    A book to be published today offers details about, Israel’s campaign to take out Iranian nuclear scientists, a campaign which is part of the Israel’s broader effort to prevent Iran from acquiring nuclear weapons; the book also says that the cyber campaign against Iran’s nuclear program was an Israeli innovation, not an American one as recently reported; it was the brainchild of Israel’s military intelligence agency (AMAN) and Unit 8-200 — Israel’s equivalent of the eavesdropping, code-breaking National Security Agency (NSA) — and endorsed by the White House at Israel’s suggestion

  • Experts: Flame represents a new level of state-sponsored cyber attacks

    The latest cyber espionage malware, Flame, represents a new level of sophistication in state-sponsored cyberattacks; experts note that Flame circumvented anti-virus programs, and remained undetected between two and five years; one expert says: “[Flame] uses multiple exploit combinations so it is pretty significant that it hid itself, but maybe the best ones have not been discovered yet”; another expert says: “The failure to detect Flame means simplistic signature-based detection is obsolete”

  • Fears of cyber espionage hinder U.S. license to China Mobile

    Serious concerns over cyberspying have fueled a debate among U.S. national security agencies about whether communications giant China Mobile should be granted a Federal Communications Commission (FCC) license to provide international service to American customers

  • Two Taiwanese nationals charged in military technology smuggling plot

    Taiwanese nationals engaged in smuggling counterfeit consumer goods and crystal methamphetamine into the United States, are discovered to be working for Chinese intelligence agencies in an effort to smuggle sensitive U.S. military technology out of the United States

  • NATO commander target of persistent Facebook cyberattacks

    The senior commander of NATO has been the target of repeated Facebook-based cyberattacks that are believed to have originated from China; Admiral James Stavridis is the subject of a campaign to gain information about him and his colleagues, friends, and family