• Ensuring that software security policies reflect user needs

    Researchers have developed a new natural language processing tool that businesses or other customers can use to ensure that software developers have a clear idea of the security policies to be incorporated into new software products

  • Dutch law enforcement wants the authority to hack foreign computers

    The Dutch government plans to give Dutch law enforcement services the ability to hack into computers – not only in the Netherlands, but also those located in other countries – for the purpose of discovering and gathering evidence in cybercrime investigations

  • Kaspersky Lab working on a secure operating system for critical infrastructure

    Antivirus firmKaspersky Lab is set to make a major contribution to the security of critical infrastructure systems by developing an operating system specifically designed for such systems; the new operating system will protect information used in infrastructure such as nuclear power plants, transportation control facilities, gas and electrical systems,and other  facilities “criticallyimportant” to the economy and well-being of industrialized societies

  • Cybersecurity bill supporters want a vote on bill in this Congress

    Last week, lawmakers and top White House officials appeared in different events, conferences, and industry gatherings to promote the cyber security bill which has been stalled in the Senate since August; administration’s officials and lawmakers supporting the bill warned that the current situation leaves U.S. critical infrastructure and businesses vulnerable to attack from hackers and spies

  • Experts, engineers gather to contribute to DARPA’s Plan X

    DARPA’s Plan X will attempt to create revolutionary technologies for understanding, planning, and managing DoD cyber missions in real-time, large-scale, and dynamic network environments; Proposers’ Day dialogue cements program approach

  • States may join feds in regulating infrastructure cybersecurity

    Dealing with cybersecurity issues relating to U.S. inmfrastructure has largely been a federal responsibility, carried out through the North American Electric Reliability Corporation Critical Infrastructure Requirements (NERC-CIP)’ the limitations of these requirements have led state regulators to consider increasing state role in infrastructure protection

  • Washington National Guard keeps an eye on cyberattacks

    The Washington National Guard is working on a project that will protect state and local governments as well as utilities and businesses in the state from cyberattacks

  • Congressional panel says two Chinese telecom companies pose “national security threat” to U.S.

    A report by the House Intelligence Committee recommended that the U.S. government be barred from doing business with two Chinese telecommunications firms – Huawei and ZTE – and that American companies should avoid buying their equipment; a committee report said the two companies pose a threat to U.S. national security; installing these companies’ technology in U.S. communication network will not only allow these companies, acting on behalf of the Chinese military and intelligence, to steal sensitive national security information and trade secrets of private U.S. companies – it will also allow China to attack and paralyze large portions of U.S. critical infrastructure

  • The administration set to issue a cybersecurity executive order

    President Obama issued a proclamation the other day making October National Cyber Security Awareness month. The administration’s efforts to push a cybersecurity bill through Congress, however, have so far failed, so the administration is opting for a solution other administrations have adopted in the face of a recalcitrant Congress: executive order

  • Self-contained, Android-based network to study cyber disruptions, help secure hand-held devices

    Researchers linked together 300,000 virtual hand-held computing devices running the Android operating system so they can study large networks of smartphones and find ways to make them more reliable and secure; the work is expected to result in a software tool that will allow others in the cyber research community to model similar environments and study the behaviors of smartphone networks

  • Experts warn of growing cyber security risks to U.S., criticize Congress’s inaction

    U.S.and Russian cyber experts are trying to scare officials into improving cybersecurity protection in the United Statesand around the world; cyber attacks against critical infrastructure escalate in scope and severity; soon, Kaspersky Lab’s Eugene Kaspersky said: “If previous viruses were like bicycles,then the Stuxnet worm that damaged uranium enrichment centrifuges at the Natanz plant in Iran two years ago would be a plane and the latest programs, dubbed Flame and Gauss,would be space shuttles”

  • Pentagon says privately owned computer networks vulnerable to attack

    Deputy U.S. Defense Secretary Ashton Carter told hundreds of industry executives and military officials at a conference that he  is concerned with the potential of a cyber attack on privately owned U.S. computer networks; “I hope this isn’t one of those situations where we won’t do what we need to do until we get slammed,” Carter said

  • New FERC office to focus on cyber security

    The Federal Energy Regulatory Commission (FERC) has created a new FERC office — Office of Energy Infrastructure Security (OEIS) —  which will help the Commission focus on potential cyber and physical security risks to energy facilities under its jurisdiction

  • German police wants to develop its own computer surveillance software

    The Federal Police Office of Germany (also known as the BKA) is looking to hire software engineers who can develop computer surveillance technology for use by law enforcement and intelligence agencies in criminal investigations

  • Boeing to pursue cybersecurity opportunities in Japan

    Boeing and Japanese trading company Sojitz are teaming up to offer advanced cybersecurity solutions in Japan to help protect critical government, civil, and commercial information technology infrastructure