-
PNNL to help DHS address critical infrastructure vulnerabilities
The Department of Energy’s Pacific Northwest National Laboratory (PNNL) has been named a supporting laboratory to the National Infrastructure Simulation and Analysis Center (NISAC). NISAC is a Department of Homeland Security (DHS) program which addresses the potential vulnerabilities and consequences of disruption of U.S. critical infrastructure. PNNL says it will contribute advanced computer modeling and simulation capabilities to look at the dependencies, interdependencies, vulnerabilities, and complexities of important critical infrastructure sectors such as dams, water, transportation, energy, and information technology.
-
-
Better understanding of how computer users detect malware and phishing attacks
Detecting malware and phishing attacks are user-centered functions, but little is understood about the user behavior underlying these tasks. Researchers have conducted a study that provides new insights on users’ susceptibility to, and capability to detect, cyber-criminal attacks such as malware and phishing attacks. The study analyzed users’ brain activity and eye gaze movements as they were subjected to these attacks.
-
-
Amendment to CISA: U.S. courts could pursue foreigners for crimes abroad against other foreigners
A controversial amendment to an already-controversial cybersecurity bill will allow U.S. courts to pursue, convict, and jail foreign nationals in cases in which these foreigners committed crimes against other foreigners on foreign soil. The amendment to the Cybersecurity Information Sharing Act (CISA) cleared a key Senate hurdle on Thursday. It aims to lower the barrier for prosecuting crimes committed abroad.
-
-
EFF leads privacy advocates in opposing CISA
Privacy advocates have intensified their campaign against the Cybersecurity Information Sharing Act (CISA), which the Senate will vote on sometime next week. The Electronic Frontier Foundation (EFF) says it vehemently opposes the bill, as well as amendments which would expand the Computer Fraud and Abuse Act. EFF says that CISA is fundamentally flawed. The bill’s broad immunity clauses, vague definitions, and what EFF describes as “aggressive spying powers” combine to “make the bill a surveillance bill in disguise.”
-
-
Ruling shows Europe still vexed over NSA spying, leaving U.S. companies in legal limbo
For over fifteen years, the Data Transfer Pact between the European Union and the United States, more commonly known as Safe Harbor, had ensured that companies with EU operations could transfer online data about their employees and customers back to the United States despite stark differences between U.S. and European privacy law. Earlier this month, U.S. companies operating in Europe got some unwelcome news: Safe Harbor had been ruled invalid. The European court’s ruling has serious implications for these companies’ business models and profitability, leaving many scrambling to find solutions. But it also exposes a fundamental cultural rift between the U.S. and Europe’s conceptions of privacy – one that a new agreement won’t be able to paper over.
-
-
New tool allows users to see how their personal information is used on the Web
Navigating the Web gets easier by the day as corporate monitoring of our e-mails and browsing habits fine-tune the algorithms that serve us personalized ads and recommendations. But convenience comes at a cost. In the wrong hands, our personal information can be used against us, to discriminate on housing and health insurance, and overcharge on goods and services, among other risks. “The Web is like the Wild West,” says one researcher. “There’s no oversight of how our data are being collected, exchanged and used.”
-
-
Identifying stealth attacks on complicated computer systems
Imagine millions of lines of instructions. Then try and picture how one extremely tiny anomaly could be found in almost real-time and prevent a cyber security attack. A trio of Virginia Tech computer scientists has tested their “program anomaly detection approach” against many real-world attacks.
-
-
Cyberthreats, cyberattattacks will only increase over time: Experts
The increasing dependency of a growing number of organizations on the Internet has served to increase the number of targets for hackers, particularly those organizations that have not given adequate attention to securing their network as they should. Even those networks not connected to the Internet are not immune from penetration by hackers. This is a threat that shows no sign of ever slowing down. More likely it will only increase over time, as cyber-capabilities are developed by more and more entities.
-
-
Guarding networks from “insider threats”
Even the best-protected, most sensitive computer networks resemble castles: They have walls to ward off outside threats, but their interiors are full of weak points. This is why the “insider threat” — someone within a system who, out of malice or naiveté puts a system at risk - -is considered one of the most serious risks in the cybersecurity world. “The insider threat is clearly a challenge for organizations, because most countermeasures were developed for external attacks,” says one researcher.
-
-
Grid Security Conference focuses on information sharing among stakeholders
More than 300 industry and federal partners are participating in the North American Electric Reliability Corporation’s (NERC) annual grid security conference, or GridSecCon, in Philadelphia, which opened on Wednesday and ends today. The conference is focusing on key cyber and physical security issues and training for enhancing the security and resiliency of the North American bulk power system. Topics of panel discussions include upgrades to NERC’s E-ISAC, cyber and physical security technology options, the transition to Version 5 of NERC’s critical infrastructure protection standards; and expectations for NERC’s third grid security exercise, GridEx III, which takes place 18-19 November.
-
-
Improve cybersecurity in energy delivery
Cyber networks support many important functions within energy delivery systems, from sending data between a smart meter and utility to controlling oil or gas flow in a pipeline. However, they are vulnerable to disturbances. According to the ICS-CERT Monitor, a publication of the U.S. Department of Homeland Security, a third of the 245 reported cyber incidents in industrial control systems that happened in 2014 occurred in the energy sector. The U.S. Department of Energy (DoE) initiative awards $28.1million to a consortium of eleven universities and research organizations, with the goal of improving computer/communication networks for energy delivery systems like power grids and pipelines.
-
-
Protecting the U.S. power grid from cyberattacks
In the first half of Fiscal Year 2015, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), part of the Department of Homeland Security, responded to 108 cyber incidents impacting critical infrastructure in the United States. As in previous years, the energy sector led all others with the most reported incidents. Researchers from Florida International University’s (FIU) College of Engineering and Computing have teamed up with four other universities and a utility company to help safeguard the nation’s power utilities from cyberattacks.
-
-
U Warwick, U.K. National Grid expand £1.5 million partnership
Last week the University of Warwick and the U.K. National Grid have signed a Memorandum of Understanding (MoU) to extend the strategic alliance they have operated for last two years. To date that alliance has engaged in over £1.5 million worth of research and student scholarships in areas such as electricity transmission asset management, gas transmission, micro-tunneling, and cyber security.
-
-
Listening in on hackers talking
Online conversations help fill critical gap in cybersecurity knowledge about attackers’ motivations, possible targets. Researchers have generated findings that shed light on how hacker communities interact and share information — and even created actionable intelligence for criminal investigations by federal agencies.
-
-
White House will not seek law allowing law enforcement access to encrypted messages
The Obama administration has decided not to seek legislation which would require tech companies to design their devices in a way which would give law enforcement agencies access to individuals’ encrypted messages, the White House said on Saturday. The tech industry, led by giants Apple, Google, Facebook, IBM, and Microsoft, has mounted a vigorous campaign opposing any administration moves to weaken ever-more-sophisticated encryption systems which are designed to protect consumers’ privacy.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.