-
Cybersecurity company using hackers own devices against them
A California cybersecurity start-up, marketing itself as a private cyber intelligence agency, works to identify foreign attackers who are attempting to steal corporate secrets; it does so by using the attackers’ own techniques and vulnerabilities against them; the company also collects data on hackers and tricks intruders into stealing false information
-
-
Expert show how to crack every common password in under six hours
GPU computing has improved considerably in recent years, and Jeremi Gosney, founder and CEO of Stricture Consulting Group, used a 25-GPU cluster that can run through 350 billion guesses per second to show how easy it would be to crack practically any password out there (easy, that is, if you can use a 25-GPU cluster )
-
-
New NIST report offers guidance in cryptographic key generation
Protecting sensitive electronic information in different situations requires different types of cryptographic algorithms, but ultimately they all depend on keys, the cryptographic equivalent of a password; a new publication from the National Institute of Standards and Technology (NIST) aims to help people secure their data with good keys no matter which algorithm they choose
-
-
Israel cyber security incubator program established by Ben-Gurion University of the Negev
Israel has been named one of the top three world leaders in the field of cyber security; approximately twenty-five Israeli information security firms have been acquired by multinational organizations, and Israeli companies are counted among the world’s leading IT security providers; Ben-Gurion University of the Negev (BGU) and its technology transfer company, BGN Technologies, will create Israel’s first cyber security incubator in Beer-Sheva
-
-
Huawei rejects U.S. “threat to national security” claims
In October the United States House Intelligence Committee issued a report warning U.S. companies against using two Chinese companies, Huawei and ZTE, for their telecommunication technology needs; the report said that the firms may be too close to China’s Communist Party and its military’ the report also suggested their products and services could pose a threat to the security of the United .States; Huawei vigorously disputes both claims
-
-
Quantum cryptography may soon go main stream
Researchers have perfected a technique that offers a less expensive way to ensure the security of high-speed fiber-optic cables, protecting communication networks from unauthorized snooping; this means that existing telecom networks can now be secured with this ultimate form of encryption
-
-
DARPA’s program to reveal backdoors, hidden malicious functionality in commercial IT devices
The scenario is one that information security experts dread: widespread dissemination of commercial technology which is secretly wired to function in unintended ways or even spy on its users; from this vantage point, mobile phones, network routers, computer work stations, and any other device hooked up to a network can provide a point of entry for an adversary; for the Department of Defense this issue is of great concern, and DARPA pland to do something about it
-
-
Pacemakers, other implanted devices, vulnerable to lethal attacks
IT experts reported that security flaws in pacemakers and defibrillators could be putting lives at risk; the experts say that many of these devices are not properly secured and therefore are vulnerable to hackers who may want to commit an act that could lead to multiple deaths
-
-
Social media as preventative method for infectious diseases
When it comes to stopping illness, social media posts and tweets may be just what the doctor ordered; researchers are studying whether a well-timed post from a public authority or trustworthy person could be as beneficial as flu shots, hand-washing, or sneezing into an elbow
-
-
DHS awards $23.6 million to fund development of new software analysis technology
DHS awarded a $23.6 million grant to the Morgridge Institute for Research at the University of Wisconsin-Madison to create the Software Assurance Marketplace, which, over the next five years, will work closely with developers of new software analysis technology and the open source community to advance the security of software; initial operating capabilities for the Software Assurance Marketplace will include the ability continuously to test up to 100 open-source software packages against five software assurance tools on eight platforms, including Macintosh, Linux, and Windows
-
-
New method to rid inboxes of unsolicited e-mail
Spam used to be text-based, but has recently turned high-tech, using layers of images to fool automatic filters; thanks to some sophisticated new cyber-sleuthing, researchers at are working toward a cure
-
-
U.S. electric power grid “inherently vulnerable” to terrorist attacks: report
The U.S. electric power delivery system is vulnerable to terrorist attacks which could cause much more damage to the system than natural disasters such as Hurricane Sandy, blacking out large regions of the country for weeks or months, and costing many billions of dollars, says a newly released report by the National Research Council
-
-
Searching social media sources by geography
Geofeedia, has created a group of algorithms that can search multiple social media sources by geography in real time; the postings, pictures, and tweets that show up in the results of a search are geolocation-enabled, are free, and results can be streamed on a mobile device, computer, or tablet. Businesses may have to pay a fee for more intensive searches
-
-
Students writing their own tickets
Four students at the University of New South Wales say they have cracked the secret algorithm used in Sydney’s public transportation system, which will allow them to print their own tickets
-
-
Georgia Tech releases cyber threats forecast for 2013
The year ahead will feature new and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information and continuous threats to the U.S. supply chain from global sources; those were the findings made by the Georgia Tech Information Security Center (GTISC) and the Georgia Tech Research Institute (GTRI) in this week’s release of the Georgia Tech Emerging Cyber Threats Report for 2013
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.