-
Sponsors of CISPA to address nagging privacy concerns about the bill
House Intelligence Committee chairman Mike Rogers (R-Michigan) and Ranking Member Dutch Ruppersberger (D-Maryland), sponsors of the Cyber Information Sharing and Protection Act (CISPA), say they are currently working on the draft to alleviate privacy concerns civil liberty advocates may have about the bill.
-
-
Future computers will identify users by thoughts, not passwords
Instead of typing your password, in the future you may only have to think your password, according to researchers. A new study explores the feasibility of brainwave-based computer authentication as a substitute for passwords.
-
-
A better single-photon emitter for quantum cryptography
In a development that could make the advanced form of secure communications known as quantum cryptography more practical, researchers have demonstrated a simpler, more efficient single-photon emitter that can be made using traditional semiconductor processing techniques.
-
-
House Intelligence Committee to work on cybersecurity bill in camera
The House Intelligence Committee will meet next week in order to draft a cybersecurity bill, known as the Cyber Intelligence Sharing and Protection Act (CISPA), but will not allow media members or the public to sit in on meetings during the process.
-
-
Fully secure communication
Can worldwide communication ever be fully secure? Quantum physicists believe they can provide secret keys using quantum cryptography via satellite. These physicists have, for the first time, successfully transmitted a secure quantum code through the atmosphere from an aircraft to a ground station.
-
-
NYPD issues strict guidelines for use of social media by officers
The New York Police Department (NYPD) has issued strict guidelines for employees using social media, and ordered its employees to take a second look at their profiles on Facebook, Twitter, and other social networking sites to ensure they conform to the new rules. The NYPD follows other police departments around the country in insisting that police officers draw a clearer line between their private life, as reflected in their social media postings, and their official duties.
-
-
DHS seeking student hackers
DHS Secretary Janet Napolitano on Tuesday said that due to “new and rapidly growing threats” of a cyberattack, hundreds of college-age hackers are needed to help deal with the massive number of daily incursions into the nation’s electrical grid and other critical infrastructure.
-
-
Draft cybersecurity bill to increase penalties for hacking substantially
A draft of a cybersecurity bill circulating among House Judiciary Committee members would strengthen a computer hacking law. The draft would stiffen penalties for cyber crimes and establish a standard for companies to tell consumers when their personal information has been hacked. The bill would also change an existing law, making a cyber crime attempt punishable as an actual offense.
-
-
Google’s assault on privacy: a reminder
A year ago, on 1 March 2012, Goggle launched its privacy-eroding policy of combining and collating users’ information across all of Goggle’s products. Google offers no opt-out option. Forcing consumers to share every aspect and nuance of their Internet practices with the company was not enough for Google. Yesterday, the attorney generals of thirty-eight states reached an agreement with Google concerning Google’s practice of spying on Wi-Fi users. The company sheepishly admitted that its Street View Vans collected 600GB of user data from unprotected Wi-Fi networks, and was fined a measly $7 million.
-
-
Obama: at least some Chinese cyberattacks on U.S. are “state sponsored”
In an interview to be aired today on ABC News, President Barack Obama said that some, but not necessarily all, cyberattacks on U.S. firms and infrastructure originating in China were “state sponsored.” Obama stressed the need to avoid “war rhetoric” when discussing cyberattacks, and renewed his calls for Congress to strengthen cyber security while protecting civil liberties.
-
-
Using jokes as an encryption method
Encrypting a message with a strong code is the only safe way to keep your communications secret, but it will be obvious to anyone seeing such a message that the sender is hiding something, regardless of whether they are encrypting their e-mails for legitimate or illicit purposes. The solution: hiding a secret message in plain sight – for example, in simple jokes.
-
-
Napolitano testifies on cybersecurity executive order
Two Senate panels questioned DHS Secretary Janet Napolitano yesterday at a hearing on President Obama’s cybersecurity executive order and what issues need to be addressed in cyber legislation. “We simply cannot afford to wait any longer to adequately protect ourselves,” Said Senator Jay Rockefeller (D-West Virginia), chairman of the Senate Commerce Committee.
-
-
Tech companies, telecoms clash over cybersecurity executive order
Last August a cybersecurity bill died in Congress amid partisan bickering. On 12 February this year, President Obama packed many of that bill’s elements into a cybersecurity executive order. To make the order more acceptable to some of its congressional and industry critics, the president introduced an exemption which would take large technology companies off the list of companies subject to the new cybersecurity standards. This exemption placated some of the original cybersecurity bill’s critics, but angered others, chief among them telecommunication companies.
-
-
New trends in cybersecurity and information security education
The Federal Information Systems Security Educators’ Association (FISSEA)promotes cybersecurity awareness, training, and education. The annual meeting,to be held 19-21 March 2013 at NIST headquartersin Gaithersburg, Maryland, is geared toward both new and seasoned security officers, IT managers, information security educators and researchers, cybersecurity trainers and teachers, and those involved in instructional design and curriculum development.
-
-
U.S. military “unprepared” for cyberattacks by “top-tier,” cyber-capable adversary: Pentagon
A new Pentagon study concludes that the U.S. military is unprepared for a full-scale cyber-conflict with a top-tier, cyber-capable adversary. The report says the United States must increase its offensive cyberwarfare capabilities, and that the U.S. intelligence agencies must invest more resources in obtaining information about other countries’ cyberwar capabilities and plans. The report says that the United States must maintain the threat of a nuclear strike as a deterrent to a major cyberattack by other countries. The report warns that the Pentagon cannot be confident its military computer systems and communication networks are not compromised because many of the components of these systems and networks are made in countries which pose the main cyberthreat to U.S. national security.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
By John Tucker
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.