-
DARPA makes agency-sponsored software, publications available to R&D community
DARPA has invested in many programs that sponsor fundamental and applied research in areas of computer science, programs which have led to new advances in theory as well as practical software. The R&D community has asked about the availability of results, and now DARPA has responded by creating the DARPA Open Catalog, a place for organizing and sharing those results in the form of software, publications, data, and experimental details. The Web site aims to encourage communities interested in DARPA research to build off the agency’s work, starting with big data.
-
-
Making the U.S. grid sturdier, smarter, and more secure to thwart blackouts
In August 2003, fifty million customers throughout the northeastern United States and southeastern Canada lost power for up to two days. More than ten years later, the U.S. electric power system continues to be challenged. In the United States, 149 power outages affecting at least 50,000 customers occurred between 2000 and 2004, a number which grew to 349 between 2005 and 2009. In 2012, the prolonged power outages in New York and New Jersey caused by Hurricane Sandy once again demonstrated the system’s vulnerability. A broad, multidisciplinary effort by Georgia Tech researchers aims to revolutionize the delivery of electricity, advance the smart grid, thwart blackouts, integrate renewable energy sources, and secure utilities from cyberattacks.
-
-
Chemical, defense companies subject to Chinese Nitro attacks
More and more chemical and defense companies around the world are victims of Nitro attacks. These attacks, launched by government-backed Chinese hackers, install PoisonIvy, a Remote Access Tool (RAT) stealthily placed on computer systems to steal information. The majority of the computers infected belong to firms in the United States, Bangladesh, and the United Kingdom.
-
-
National Guard units help states ward off cyberattacks
Governors across the United States are mobilizing their states’ National Guard units to combat threats from cyberattacks. The state of Washington was the first state to assign the state’s National Guard cybersecurity responsibilities. The state recognized the potential of its National Guard as a cyberforce when it realized that many of its soldiers, who are full-time employees and part-time soldiers, worked for tech employers such as Google, Boeing, Cisco, Verizon, and Microsoft.
-
-
Quantum encryption for wiretap-proof communication a step closer
Polarized light, in which all the light waves oscillate on the same plane, forms the foundation for technology such as LCD displays in computers and TV sets, and advanced quantum encryption. There are two ways to create polarized light, but each has its problems: filtering normal unpolarized to block unwanted light waves (but here, half of the light emitted, and thereby an equal amount of energy, are lost), or using light which is polarized at the source (but here, polarization is either too weak or hard to control). Now there is a better way: By emitting photons from a quantum dot at the top of a micropyramid, researchers are creating a polarized light source with a high degree of linear polarization, on average 84 percent. As the quantum dots can also emit one photon at a time, this is promising technology for quantum encryption, a growing technology for wiretap-proof communication.
-
-
Two Israeli startups with innovative cybersecurity solutions raise combined $25 million
Two Israeli cybersecurity startups, launched by veterans of the IDF technology units, announced that, separately, they had raised a combined $25 million from investors. Adallom’s solution accumulates users’ behavioral data in order to protect databases. It monitors how software applications like the customer relationship management program Salesforce, Google apps, and Microsoft Office 360 are used, and protects data security. Aorato’s solution watches for suspicious usage of employee credentials – for example, multiple guessing attempts. “2013 showed the world the risks of advanced threats in parallel to the implications of insiders’ access to sensitive corporate data,” Aorato’s CEO Idan Plotnik noted, referring to the Edward Snowden’s leaks of secret government information.
-
-
National cyber complex to open next to Ben-Gurion University of the Negev campus
A new national cyber complex called CyberSpark will open at the Advanced Technology Park (ATP) which is located next to Ben Gurion University of the Negev. Fortune 500 companies Lockheed Martin and IBM announced they would invest in CyberSpark R&D facilities, joining other cybersecurity leaders Deutsche Telekom, EMC, RSA, and many startups. The 15-building ATP is the only type of complex of its kind in the world that includes Fortune 500 companies and cyber-incubators, academic researchers, and educational facilities as well as national government and security agencies. The CyberSpark will also include a high school geared toward science and technology.
-
-
Gaza-based Palestinian hackers compromise Israeli defense ministry computer
Hackers broke into a computer at the Israeli Ministry of Defense through an e-mail attachment tainted with malicious software. The attachment looked as if it had been sent by the country’s internal security service, the Shin Bet. it was likely that Palestinians were behind the cyberattack, saying that the more recent attacks were similar to cyberattacks against Israeli computers more than a year ago. Those attacks originated in the Hamas-controlled Gaza Strip. The attackers used an e-mail attachment to infect the computers with Xtreme RAT malware, which is a remote access Trojan. The malware allows hackers complete control of an infected machine. They can steal information, load additional malicious software onto the network, or use the invaded computer as a base of operations from which to conduct reconnaissance and attempt to gain deeper access into the network.
-
-
Cal Poly unveils ambitious cybersecurity educational initiative
Cal Poly, with a grant from the Northrop Grumman Foundation, has established a Cybersecurity Center, opened a new cyber lab, and is developing a cybersecurity curriculum with an ambitious set of goals in mind: educating thousands of students in cybersecurity awareness and readiness; producing experts in cyber technologies and systems, including many professionals who will serve the military and defense industry; and graduating cyber innovators who are prepared for advanced study and applied research in emerging cyber issues.
-
-
Expert calls for “surveillance minimization” to restore public trust
Surveillance minimization — where surveillance is the exception, not the rule — could help rebuild public trust following revelations about the collection of personal data, according to an expert on privacy and surveillance. “Surveillance minimization requires surveillance to be targeted rather than universal, controlled and warranted at the point of data gathering rather than of data access, and performed for the minimum necessary time on the minimum necessary people,” he says.
-
-
Botwall: New Web security solution uses real-time polymorphism to ward off attacks
Malware has long used polymorphism — that is, rewriting its code — every time a new machine was infected in order easily to evade antivirus detection systems. Shape Security says its new product, the ShapeShifter, is reversing this advantage which malware has so far enjoyed: the new product uses polymorphic code as a new foundational tool for Web site defense. The patent-pending technology implements real-time polymorphism, or dynamically changing code, on any Web site, to remove the static elements that botnets and malware depend on for their attacks.
-
-
Many VSATs operated with no security, leaving them vulnerable to hacking
Very-small-aperture terminals, or VSATs, are used by the oil and gas industry, utilities, financial firms, and news media to transmit information, often sensitive, from remote locations to headquarters. There are more than 2.9 million VSATs in operation around the world, with about two-thirds based in the United States. New security report says that at least 10,500 VSATs are operated with minimal or no security, and are wide open to being hacked.
-
-
House approves $447 for Cyber Command
The House of Representatives approved a fiscal 2014 stop-gap budget last Monday (it approved to full spending bill on Wednesday), which allocates $447 million to the Defense Department’s Cyber Command. This is more than twice the $191 million budget for Cyber Command in 2013.
-
-
Tracking Internet searches to predict disease outbreak
The habit of Googling for an online diagnosis before visiting a GP can provide early warning of an infectious disease epidemic. A new study found that Internet-based surveillance has been found to detect infectious diseases such Dengue Fever and Influenza up to two weeks earlier than traditional surveillance methods. Researchers say that when investigating the occurrence of epidemics, spikes in searches for information about infectious diseases could accurately predict outbreaks of that disease.
-
-
Healthcare industry to conduct cyberattack drill in March
The American health care industry, in partnership with the federal government, will in March conduct simulated cyberattacks targeting industry networks and resources in an effort to test the industry’s vulnerability to cyberattacks. This will be the first time insurers, hospitals, pharmaceutical manufacturers, and HHS will run coordinated drills. Healthcare is one of seventeen critical infrastructure sectors which, if attacked, could have damaging consequences for the country.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.