• The most pressing cybersecurity issue

    According to Red Hat’s Gunnar Hellekson the most pressing cybersecurity issue is “the threat that comes from our reactions to real and perceived threats…I see this growing ‘Fortress America’ movement around computer security and the security of the software-supply chain”

  • EMP threat to U.S. should be kept in perspective

    In 1962 the United States conducted a high-altitude nuclear test above Johnston Island, 825 miles southwest of Hawaii; detonated 400 kilometers above the island, the resulting nuclear blast knocked out street lights across Hawaii and tripped circuit breakers, triggered burglar alarms, and damaged a telecommunications relay facility on the island of Kauai; could terrorist, or a nuclear-armed rogue state, launch an EMP Pearl Harbor against the United States?

  • U.S. intensifies campaign to train, hire, retain cybersecurity professionals

    The cyber threats to both government and public network intensify, and the U.S. federal agencies must find ways to attract qualified workers and develop new skills internally; NIST’s Dr. Ernest McDuffie: “We’ve got a problem of where the next generation of engineers are going to come from— Awareness, education, workforce, and training all have to come together”

  • U.S. military wants to cyber-protect critical infrastructure

    The U.S. military wants to exert more influence over the protection of power grids, transportation networks, and financial network systems because the military relies on these networks to deal with suppliers and these networks could become military targets

  • Pentagon describes 2008 attack as a "network administrator's worst fear"

    The Pentagon admits that a 2008 cyber attack on the Pentagon’s computers was a “network administrator’s worst fear”; a USB device was
    plugged into a military laptop located on an undisclosed base in the Middle East, causing a malicious code to link highly sensitive machines to networks controlled by an unnamed foreign intelligence agency

  • Powerful GPU processor puts password security system at risk

    A readily available piece of hardware, a graphics processing unit (GPU) costing only a few hundred dollars, now brings supercomputer-level power to any desktop; this new capability puts power into many hands — and could also threaten the world’s ubiquitous password-protection model because it enables a low-cost password-breaking technique that engineers call “brute forcing”

  • The reason for Intel's acquisition of McAfee

    The merger between the two companies takes place ahead of the release in 2011 of new — and as yet undisclosed — products developed by a joint venture the two companies have operated in the past eighteen months; those undisclosed products may be part of the reason why Intel decided to purchase McAfee instead of extending or expanding the two companies’ joint venture; says one analyst: “If what came out of that joint venture was revolutionary it could be that Intel wanted to lock that [intellectual property] down”

  • House Cybersecurity Caucus launches new Web site

    Billions of dollars are spent on cybersecurity; the House cybersecurity caucus has launched a new Web site, and observers say it could provide a valuable public service if it helps aggregate disparate activities and acts as a Federal cybersecurity information hub

  • Cyberthreat "deniers" say cybersecurity experts are crying wolf

    There are those who argue that security experts warn about cyber threat are only scaring people in order to sell their security products and consulting services; one observer says: “To be sure, the financial interests of those warning about cybersecurity vulnerability should be disclosed, but their warnings shouldn’t be dismissed either— Just because you can still download movies from Netflix or update your Facebook status doesn’t mean everything’s fine”

  • Move to IPv6 may create a "security nightmare"

    IPv6, the Internet’s next-generation addressing scheme is so radically different from the current one that its adoption is likely to cause severe security headaches for those who adopt it; the radical overhaul still is not ready for prime time — in large part because IT professionals have not worked out a large number of security threats facing those who rely on it to route traffic over the net

  • INL's International Symposium on Resilient Control Systems (ISRCS)

    Idaho National Laboratory is helping generate innovative research and codify resilience in next-generation control system designs by hosting the 3rd International Symposium on Resilient Control Systems in Idaho Falls 10-12 August; INL says it sponsors the symposium to support a multidisciplinary approach to the complex nature of control system interdependencies that ensure safe and secure operation of critical components of the U.S. infrastructure including electrical grids, water supplies, and transportation

  • Commerce Department seeks comments on cybersecurity and its impact on innovation

    The U.S. Commerce Department seeks comments from all stakeholders, including the commercial, academic and civil society sectors, on measures to improve cyber security while sustaining innovation; the department says that the Internet has become vitally important to U.S. innovation, prosperity, education, civic activity, and cultural life as well as aspects of America’s national security, and that a top priority of the department is to ensure that the Internet remains an open and trusted infrastructure, both for commercial entities and individuals

  • As demand for cybersecurity professionals grows, shortages are felt

    Federal agencies, contractors, and tech companies compete with each other for cyber security work force; measuring the size of the cyber security sector is difficult, but surveys show demand for technical expertise is skyrocketing; the number of jobs posted on ClearanceJobs.com by companies and recruiters looking for professionals with active federal security clearances has jumped 11 percent to 6,100 openings this year from fewer than 5,500 in the same time period last year; Maryland wants to become U.S. cybersecurity capital

  • Indonesia joins countries mulling BlackBerry ban to fight terror

    Indonesia considers joining a growing list of countries, including India, Saudi Arabia and the UAE in banning BlackBerry devices; Research in Motion is receiving increasing pressure to allow government access to data generated by the hand-held devices

  • Smart Grid offers target-rich opportunities for hackers

    SCADA systems are vulnerable to hacking, but the smart grid is even more vulnerable; security experts at the Black Hat conference in Las Vegas last week warned that the accelerated deployment of smart-grid technology could leave critical infrastructure and private homes vulnerable to hackers; hacking may come in a benign form — customers might simply figure out how to lower their electricity bills by manipulating how much energy their meters say they are using; hacking may also have more sinister aspects: large-scale attacks may also be possible, and the smart grid’s serious vulnerabilities make it possible to shut down the power supply to an entire city