Hackers

  • Quantum cryptography to secure electric grid

    Novel methods for controlling the electric grid are needed to accommodate new energy sources such as renewables whose availability can fluctuate on short time scales. This requires transmission of data to and from control centers; but for grid-control use, data must be both trustworthy and delivered without delays. The Los Alamos National Laboratory quantum cryptography team successfully completed the first-ever demonstration of securing control data for electric grids using quantum cryptography.

  • Obama to issue cybersecurity executive order today

    President Barack Obama is expected to issue an executive order tomorrow to dealing protecting U.S. critical infrastructure from cyberattacks. The order will be issues one day after the president’s State of the Union address. The order will establish a critical infrastructure council which will be run by DHS and will include members of the Departments of Defense, Justice, and Commerce as well as the National Intelligence Office. The council will be tasked with formulating new regulations for federal agencies, or broadening regulations  already in place. The regulations will most likely include the sharing of data between private corporations and the federal government.

  • Facebook new search feature has cyber experts worried

    A new Facebook search feature has security experts concerned. They  are warning users of the site to strengthen their security settings to avoid embarrassment and to protect themselves from cybercriminals.

  • U.S. to adopt tougher stance toward China’s persistent cyberattacks

    The Obama administration let it be known that it is examining the adoption of a more assertive stance against China in response to a persistent cyber-espionage campaign waged by Chinese government hackers against U.S. companies and government agencies. The administration is preparing a new National Intelligence Estimate (NIE) which will detail the cyberthreat, particularly from China, as a growing economic problem.

  • Chinese hackers attack the New York Times

    Since 2008, Chinese government hackers have been targeting Western news organizations to identify and intimidate their Chinese sources and contacts, as well as to anticipate stories that could hurt the reputation of Chinese leaders. Chinese hackers have repeatedly infiltrated the computer systems of the New York Times over the last four months, following an investigation by the paper that revealed that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings. Security experts hired by the Times have determined that the attacks started from the same university computers used by the Chinese military to attack U.S. military contractors in the past.

  • Chinese hackers infiltrate Wall Street Journal’s computer systems

    Chinese hackers with government connections have infiltrated the computer systems of the Wall Street Journal, in the second such Chinese attack on a major U.S. media outlet. WSJ says the hackers were trying to monitor its coverage of Chinese affairs.

  • Pentagon to bolster U.S cyberwar capabilities

    The Department of Defense is planning an expansion of the U.S. Cyber Command, and the Pentagon plans on recruiting thousands of code crackers, online security professionals, and hackers in order to assemble the nation’s largest cyber army ever.

  • DoD to use connections to stay ahead of cyber threats

    The Department of Defense (DoD) maintains one of the largest computer networks in the world. The network follows DoD personnel across the globe collecting, transferring, and processing information in forms as diverse as data warehouses, in-the-field mobile devices, and mission computers on board F-18’s. New program looks at how information is connected and moves to uncover and prevent targeted attacks.

  • Grammar rules undermine security of long computer passwords

    When writing or speaking, good grammar helps people make themselves understood. When used to concoct a long computer password, however, grammar — good or bad — provides important hints that can help someone crack that password, researchers at Carnegie Mellon University have demonstrated by devising grammar-aware password cracker.

  • Personal genetic information vulnerable to hacking

    Using only a computer, an Internet connection, and publicly accessible online resources, a team of researchers has been able to identify nearly fifty individuals who had submitted personal genetic material as participants in genomic studies.

  • DHS: Industrial control systems subject to 200 attacks in 2012

    A DHS report released last week revealed that industrial control systems, which are used to monitor and control critical infrastructure facilities, were hit with 198 documented cyberattacks in 2012, and that many of these attacks were serious.

  • Cybersecurity company using hackers own devices against them

    A California cybersecurity start-up, marketing itself as a private cyber intelligence agency, works to identify foreign attackers who are attempting to steal corporate secrets; it does so by  using the attackers’ own techniques and vulnerabilities against them; the company also collects data on hackers and tricks intruders into stealing false information

  • Israel cyber security incubator program established by Ben-Gurion University of the Negev

    Israel has been named one of the top three world leaders in the field of cyber security; approximately twenty-five Israeli information security firms have been acquired by multinational organizations, and Israeli companies are counted among the world’s leading IT security providers; Ben-Gurion University of the Negev (BGU) and its technology transfer company, BGN Technologies, will create Israel’s first cyber security incubator in Beer-Sheva

  • Huawei rejects U.S. “threat to national security” claims

    In October the United States House Intelligence Committee issued a report warning U.S. companies against using two Chinese companies, Huawei and ZTE, for their telecommunication technology needs; the report said that the firms may be too close to China’s Communist Party and its military’ the report also suggested their products and services could pose a threat to the security of the United .States; Huawei vigorously disputes both claims

  • DARPA’s program to reveal backdoors, hidden malicious functionality in commercial IT devices

    The scenario is one that information security experts dread: widespread dissemination of commercial technology which is secretly wired to function in unintended ways or even spy on its users; from this vantage point, mobile phones, network routers, computer work stations, and any other device hooked up to a network can provide a point of entry for an adversary; for the Department of Defense this issue is of great concern, and DARPA pland to do something about it