• Chinese hackers steal South Korean defense secrets

    Chinese hackers have stolen secrets on South Korea’s defense and foreign affairs by using bogus e-mails claiming to come from Seoul officials and diplomats; similar attacks originating in China-based servers briefly crippled U.S. and South Korean government and commercial Web sites in July 2009

  • U.S. considering Aussie Internet security program

    The Obama administration is considering adoption of parts of an Internet security scheme which will go into effect in Australia in December; the plan will allow Internet service providers to alert customers if their computers are taken over by hackers — and could limit these customers’ online access if they do not fix the problem

  • U.K. security firms say GCHQ's cyberattack warning overwrought

    U.K. cybersecurity industry insiders say last week’s warnings by Britain’s cybersecurity chief about the cyber threat the U.K. was facing may have over-hyped threats — and may have been related more to the run-up to the U.K. government’s comprehensive spending review announcement than to new threat information

  • Microsoft releases barrage of fixes at Stuxnet and more

    Microsoft on Tuesday released a record high number of software patches aimed at countering computer threats including a Stuxnet “worm” attacking industrial networks; the 49 fixes released by Microsoft were ranked in importance from “critical” to “moderate” and addressed vulnerabilities in an array of Microsoft programs used in personal computers

  • Microsoft cleaned 6.5 million zombie PCs during April-June 2010

    Microsoft cleaned in excess of 6.5 million zombie computers between April and June 2010, but the company’s efforts alone are not enough to put a stop to the increasing threat that botnets represent to users, businesses and critical infrastructure

  • Britain faces "real and credible" cyber threat: intelligence chief

    In a rare public speech, Iain Lobban, director of the Government Communications Headquarters (GCHQ), said that there is a “real and credible” cyber threat to U.K. infrastructure, and that Britain’s economy could be at risk if effective protection against cyber attacks was not developed

  • Ethical hacking conference coming to Charleston, WVA

    A major ethical hacking event will take place in Charleston, West Virginia, 23-24 October; the event will focus on “white hat hacking” — meaning learning how to think like the “black hat hackers” or bad actors and how they operate; a Hacker Village will be set up at the Charleston Civic Center featuring a network of systems designed with vulnerabilities so attendees can try their stuff with mentors on hand

  • Students think hacking is "cool"

    A third of students surveyed thought that hacking was “cool,” and a similar number thought it was “easy”; the survey found that 37 percent had hacked Facebook accounts, 26 percent e-mail accounts, with 10 percent breaching online shopping accounts; an entrepreneurial 15 percent revealed that they hacked to make money

  • The most pressing cybersecurity issue

    According to Red Hat’s Gunnar Hellekson the most pressing cybersecurity issue is “the threat that comes from our reactions to real and perceived threats…I see this growing ‘Fortress America’ movement around computer security and the security of the software-supply chain”

  • Smartphone security products begin to make it to market

    A modern smartphone has many of the same capabilities as a PC and is way more vulnerable to certain kinds of attack; even so, few smartphone users see security apps as essential; Austrian security testing lab AV-Comparatives has justreleased a study comparing four smartphone security products

  • Need for digital security spurs growth of cyber security field

    The growing need for digital security has made the shortage of cyber security professionals in the United States even more apparent, and the U.S. government is now engaged in a campaign to train, hire, and retain thousands of cyber professionals; the private sector is doing its share, too: Raytheon initiated the MathMovesU program in 2005, to inspire middle school students to consider math, science, and engineering education and careers; Raytheon awards more than $2 million annually in scholarships and grants to students, teachers, and schools nationwide

  • U.S. intensifies campaign to train, hire, retain cybersecurity professionals

    The cyber threats to both government and public network intensify, and the U.S. federal agencies must find ways to attract qualified workers and develop new skills internally; NIST’s Dr. Ernest McDuffie: “We’ve got a problem of where the next generation of engineers are going to come from— Awareness, education, workforce, and training all have to come together”

  • Pentagon describes 2008 attack as a "network administrator's worst fear"

    The Pentagon admits that a 2008 cyber attack on the Pentagon’s computers was a “network administrator’s worst fear”; a USB device was
    plugged into a military laptop located on an undisclosed base in the Middle East, causing a malicious code to link highly sensitive machines to networks controlled by an unnamed foreign intelligence agency

  • Intel wants security built directly into silicon

    A consensus is emerging that the main reason for Intel’s acquisition of McAfee is that Intel wants to build directly into its hardware the kind of security features more traditionally provided by software like McAfee’s

  • Technological challenges to Intel's embedded security approach

    Embedding security in silicon faces many challenges, among them: how much can be placed into a chip, and the fact that patching hardware or firmware is when a security vulnerability is discovered, is much harder than patching software