• Five hot topics to be discussed at Black Hat and Defcon

    Among the many topics to be discussed at Black Hat, which opens today, and DefCon, which opens Friday, is SCADA networks vulnerability; many of these networks have developed a no man’s land between IT and industrial systems, and these networks’ computers are often at risk because nobody seems to take complete ownership of them; there will be a talk about where bugs show up in the infrastructure; the speaker is Jonathan Pollet, whose company, Red Tiger Security, has collected data on 38,000 vulnerabilities — and the types of exploits that have been written for them

  • First puzzle of U.K Cyber Security Challenge competition cracked

    The United Kingdom suffers from a dearth of cybersecurity experts; several private and public organizations have launched the Cyber Security Challenge competition — a series of challenges and games that would test the talent and skills of people; the challenges is built around eight key skill areas which include digital forensics, network analysis and logical thinking; enthusiasts claim they have already solved he first test of the challenge

  • Black Hat opens Wednesday in Las Vegas, DefCon to follow Friday

    Black Hat, one of the more important cybersecurity event, opens this Wednesday in Las Vegas; Black Hat gives way on Friday to DefCon, “Black Hat is a place where security researchers go to show off their work and get peer feedback,” said Jeff Moss, who founded and runs both gatherings; “DefCon is the fun stuff they don’t have time to do in their day jobs”; DefCon’s array of activities includes a lock picking village and a “capture the flag” contest to see who can break into a computer network and fend off rivals

  • New report: Apple software has the most vulnerabilities

    The usual suspects lead the list of software makers whose software come with most vulnerabilities — Apple, Microsoft, Oracle, and Adobe; new vulnerabilities report offers support to the notion that a high market share correlates with a high number of vulnerabilities

  • The worst database security breaches in the U.S., U.K.

    On 6 February 2010 AvMed Health Plans announced that personal information of current and former subscribers have been compromised by the theft of two company laptops from its corporate offices in Gainesville, Florida; the information was comprehensive, including Social Security numbers and protected health information; attempts the thwart the theft have been unsuccessful, leaving the identity data of nearly 1,100,000 vulnerable; this is only one of many cases of database breaches — and the number of cases is growing

  • Cybersecurity solution detects cyber attacks as they happen

    A winning entry in a cyber security competition gives analysts a way to look at computer network traffic and determine how a system was penetrated; it also supplies critical data that can be used to reduce system vulnerabilities and limit future attacks

  • Digital retaliation: Turkish hackers steal personal information of 122,000 Israelis

    A month ago Israel stopped several ships, sponsored by a Turkish fundamentalist Islamic organization, which tried to breach the Israeli blockade of the Gaza Strip; nine Turkish militants were killed after they had attacked Israeli soldiers; Turkish hackers launched a retaliatory attack on Israeli digital databases, stealing the e-mail addresses and credit card and PayPal account information of 122,000 Israelis; the hackers also attacked 2,100 Israeli Web sites; security expert advises affected Israelis to change passwords, and credit cards.

  • U.S. government to direct more to cybersecurity

    The three themes undergirding the Obama administration’s multi-billion dollar cybersecurity strategy: first, “tailored trustworthy spaces,” which means creating different security levels for different government and non-government Internet activities; second, “moving targets,” in which the search is for security systems that change constantly to increase uncertainty for hackers; third, “economic incentives,” which involves seeking to find ways to motivate users to adopt cybersecurity defenses

  • World's youngest known hacker caught

    A 9-year old student outwits Virginia school district’s cxybersecurity measures; the youngster used teacher’s login to access Blackboard, and then modify class enrollment lists, change the password login details of teachers, and modify homework assignments

  • Schmidt: private sector key to warding off cyber attacks

    White House cybersecurity coordinator says the private sector is where the best defense against cyberattacks and cyber warfare can be mounted; the government can do a lot to improve U.S. cyber defenses, but the key to warding off attacks remains private-sector vigilance; one major technology Web site agrees: “This is a battle every IT security professional must fight from the foxholes”

  • Cybercriminals exploit search engine optimization techniques

    Cybercriminals have another tool at their disposal: search engine optimization (SEO); hackers use automated kits to apply blackhat SEO methods — cynically exploiting tragic or salacious breaking news stories — to subvert searches in order to point surfers toward scareware download portals or other scams

  • Experts say smart meters are vulnerable to hacking

    In the United States alone, more than eight million smart meters have been deployed by electric utilities and nearly sixty million should be in place by 2020; security experts are worried that this rush to deployment of smart meters ignores serious security vulnerabilities: the interactivity which makes smart meters so attractive also makes them vulnerable to hackers, because each meter essentially is a computer connected to a vast network

  • Top U.S. cyber official: cyber threat poses existential threat to U.S.

    Senior Obama administration official: “I am convinced that given enough time, motivation and funding, a determined adversary will always — always — be able to penetrate a targeted system”; as a result: “The cyber threat can be an existential threat — meaning it can challenge our country’s very existence, or significantly alter our nation’s potential”

  • iPhone, IE8, Firefox, and Safari easily hacked at Pwn2Own contest

    Hackers gathered for an annual contest in Vancouver demonstrate easy hacking of iPhone and all major browsers; a non-jailbroken iPhone was also hacked and its SMS database stolen; security measures taken by Firefox, Safari, and IE8 no match for hackers

  • The Norton Top 10: Seattle is the riskiest U.S. city for cybercrime; Detroit is the safest

    A study of the cybercrime-proneness of fifty American cities finds that from the perspective of cybersecurity, Seattle is the riskiest city in America: If you live and work there and use the Internet, your are more vulnerable to cybercrime than in any other place; the cyber-safest cities: Detroit, Michigan, El Paso, Texas, and Memphis, Tennessee