-
Stuxnet and Duqu part of assembly line: researchers
Stuxnet, the highly sophisticated piece of malicious code that was the first to cause physical damage, could just be the tip of the iceberg in a massive cyberweapon manufacturing operation; according to cybersecurity researchers at Kaspersky Labs and Symantec, Stuxnet appears to be part of a larger cybersecurity weapons program with fully operational and easily modified malicious code that can be aimed at different targets with minimal costs or effort
-
-
Hackers continue cyberwar against Israel
As part of an intensifying cyberwar against Israel, on Monday hackers brought down several key websites including the Tel Aviv Stock Exchange, the national airline, and three banks
-
-
Chinese hackers target DoD, DHS smart cards
Cybersecurity researchers have discovered malicious code developed by Chinese hackers to target the smart cards used by Defense Department, DHS, and State Department personnel
-
-
Gender gap hinders cybersecurity hiring boom
As governments and private businesses clamor to hire computer experts, women are conspicuously missing from the employment boom; women account for over half the professional workforce, yet only 25 percent of information technology jobs are filled by females
-
-
Sandia addresses complex DNS vulnerabilities
A Sandia researcher has developed a visualization tool to help network administrators within the federal government and global IT community better understand Domain Name System Security (DNSSEC) and also help them troubleshoot problems
-
-
Al Qaeda wants to be your “friend” and “follower”
Hackers attacking databases is just one facet of online terrorist activity; international terrorist organizations have shifted their Internet activity focus to social networks and today a number of Facebook groups are asking users to join and support Hezbollah, Hamas, and other armed groups that have been included in the West’s list of declared terror organizations
-
-
Delaware student takes top prize at annual cyber competition
The U.S. Cyber Challenge recently announced the results of its annual Fall Cyber Foundations competition with the top honors going to Gavy Aggrawal, a sophomore at Delaware’s Charter School of Wilmington
-
-
Japan develops anti-hacker weapon
The Japanese Ministry of Defense recently revealed that it is developing a new weapon to combat hackers – a “seek and destroy” virus designed to track and disable the source of cyber-attacks
-
-
ETrade cyberattack shuts down trading
Over the holiday season, Australia’s second-largest online brokering service, ANZ Bank’s ETrade was hit by a series of cyberattacks, temporarily locking out customers
-
-
Government contractors now required to have cybersecurity plans
Based on a new General Services Administration (GSA) rule, all contractors and subcontractors that provide federal agencies with IT services, systems, or supplies are required to submit a cyberescurity plan that matches government regulations
-
-
Signcryption technology tightens cybersecurity
Signcryption is a data security technology by which confidentiality is protected and authenticity is achieved seamlessly at the same time; it has now been formally recognized as an international standard by the International Organization of Standardization (ISO)
-
-
UMD, Lunarline partner on cybersecurity
The University of Maryland Cybersecurity Center will partner with Lunarline Inc. on cybersecurity education, research, and technology development
-
-
Wireless passwords vulnerable to hackers, US-CERT warns
The U.S. government is warning wireless users that their home and business networks are highly vulnerable to hackers
-
-
Smartphone users hold false sense of security
A recent study reveals that smartphone users maintain a false sense of cybersecurity
-
-
New Apple facial recognition tech could make passwords obsolete
Passwords could become a thing of the past for Apple iPhone and iPad users; the tech company recently revealed a patent application for what it is calling “Low Threshold Face Recognition,” a tool that would allow users to unlock their phones by simply picking up the device and pointing it at their face
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.