-
DHS questioned over pressure it put on a library to disable Tor node
Back in September, Kilton Public Library in Lebanon, New Hampshire briefly disabled its Tor relay after local police, following a tip from agents with Homeland Security’s investigations branch that the network may be used by criminals or terrorists. A Congresswoman from California wants to know why DHS officials pressured the New Hampshire library to take down the relay node, and whether DHS has leaned on other organizations to do so.
-
-
Following indictments, China’s military reduces its commercial cybeespionage against American companies
The People’s Liberation Army (PLA) has reduced its cyberespionage activity targeting American companies since five PLA officers were indicted by the Department of Justice in May 2014. “The indictments had an amazing effect in China, more than we could have hoped for,” said one expert. In April, Obama signed an executive order calling for impose economic sanctions on individuals and entities that take part in or benefit from illicit cyber-activities such as commercial espionage. “If the indictments had the effect of getting the PLA to scale down, then sanctions likely will have a wider effect on other Chinese state-sponsored groups,” says another expert.
-
-
FBI unable to break 109 encrypted messages Texas terror attack suspect sent ahead of attack
FBI director James Comey told lawmakers this week that one of the suspects in the foiled terror attack in Garland, Texas, in May had exchanged 109 messages with sources in a “terrorist location” overseas ahead of the attack. U.S. intelligence and law enforcement agencies, however, have not been able to break into and read those messages because they were exchanged on devices equipped with end-to-end encryption software which, security services in the United States and Europe argue, make it impossible to monitor and track terrorists and criminals.
-
-
Low-cost malware detection
The battle between malware authors and security researchers has changed dramatically in the last few years. The purpose behind malware was often for the sake of a prank, to expose vulnerabilities, or for the sake of spite. Today, malware is more about stealing sensitive data and exploiting information for fraud, identity theft, and other criminal intent. An add-on for antivirus software that can scan across a computer network and trap malicious activity missed by the system firewall is being developed by an international team.
-
-
Untraceable communication -- guaranteed
Anonymity networks, which sit on top of the public Internet, are designed to conceal people’s Web-browsing habits from prying eyes. The most popular of these, Tor, has been around for more than a decade and is used by millions of people every day. Recent research, however, has shown that adversaries can infer a great deal about the sources of supposedly anonymous communications by monitoring data traffic though just a few well-chosen nodes in an anonymity network. Researchers have developed a new, untraceable text-messaging system designed to thwart even the most powerful of adversaries.
-
-
Concerns over attacks on the U.S. electrical grid increase after Paris attacks
In the aftermath of the 13 November attacks in Paris, U.S. government agencies involved with grid security and utilities are preparing to thwart a major attack on the U.S. electrical grid. Government agencies and utilities believe an attack or series of attacks on the electrical grid of the United States is imminent — more so in the aftermath of the attacks on Paris. They are carrying out drills and exercises to brace for them.
-
-
EU Internet Forum launched to fight radicalization, terrorist content online
The EU earlier this week launched the EU Internet Forum. The aim of the forum is to bring together EU interior ministers, high-level representatives of major Internet companies, Europol, the EU counterterrorism coordinator, and the European Parliament. The EU says that the goal is to reach a joint, voluntary approach based on a public-private partnership to detect and address harmful material online.
-
-
Good apps talking to bad Web sites behind your back
In one of the first studies to analyze behind-the-scenes behaviors of good applications, researchers conducted a large-scale analysis of URLs embedded in 13,500 free android apps downloaded from Google Play. The apps tested were created by reputable developers and downloaded by many people, among them popular social media, shopping, news and entertainment apps. The researchers found that almost 9 percent of popular apps downloaded from Google Play interact with Web sites that could compromise users’ security and privacy; 15 percent talked to bad Web sites (with intentions that vary from harming devices, stealing confidential data or annoying users with spam); and 73 percent talked to low-reputation Web sites(those receiving a Web of Trust rating lower than 60/100).
-
-
New cybersecurity legislation would shield companies from public records laws
A legislation which passed both houses of Congress, but has not yet signed into law by the president, aims to encourage companies and organizations to share with the U.S. government information about cyberattacks and cyberthreats they experience –but critics say there is a catch: the legislation would severely restrict what the public can learn about the program.
-
-
USD launches a new Center for Cyber Security Engineering and Technology
To address the threats cyberattacks pose to the security, prosperity, and privacy of the United States and its citizens, the University of San Diego announced the creation of its Center for Cyber Security Engineering and Technology. The Center will focus on cybersecurity challenges through education, training, and research.
-
-
N.Y. State Police app helps citizens report suspicious activity
The New York State Police is urging citizens to download a new digital app which allows citizens to capture and report suspicious activity with their smart phones. The app is part of the “See Something, Send Something” campaign which aims to turn willing citizens into the eyes and ears of law enforcement. For example, if a citizen notices an unattended package at a train station of an airport, they could use the app to alert law enforcement.
-
-
Tech companies: weakening encryption would only help the bad guys
Leading technology companies — Apple, Microsoft, Google, Samsung, Twitter, Facebook, and fifty-six other technology companies — have joined forces to campaign against weakening end-to-end encryption, insisting that any weakening of encryption would be “exploited by the bad guys.” Apple’s chief executive Tim Cook recently asserted that “any backdoor is a backdoor for everyone.”
-
-
DHS runs many unsecured databases: IG
DHS Inspector General found that DHS is running dozens of unpatched databases, some of which are rated “secret” and even “top secret.” An audit of the department’s IT infrastructure has found large security gaps, including the fact that 136 systems had expired “authorities to operate” – that is, no one was in charge of keeping them updated. Of the 136, 17 were classified as “secret” or “top secret.”
-
-
E-mail security is better than it was, but far from perfect
E-mail security helps protect some of our most sensitive data: password recovery confirmations, financial data, confidential correspondences, and more. A new report finds that e-mail security is significantly better than it was two years ago, but still has widespread issues.
-
-
Encryption firm tightens access following Paris attacks
Encrypted communications specialist Silent Circle, after learning that ISIS was recommending two of the company’s products — the encrypted Blackphone handset and Silent Phone applications for private messaging — to the organization’s followers, is taking steps to make it more difficult for terrorists and their followers to use these products.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.