-
DARPA holds $40,000 competition to test social media in disasters
To better understand how emergency responders can leverage social media tools, the Defense Advanced Research Projects Agency (DARPA) is holding the$40,000 CLIQR Quest Challenge
-
-
Anonymous retaliates, takes down Interpol site
In retaliation for the arrest of twenty-five suspected members of the hacktivist collective known as Anonymous, the group briefly took down Interpol’s website on Tuesday
-
-
Cryptographic attack shows importance of bug-free software
Researchers have developed an attack that can circumvent the security OpenSSL should provide; the attack worked on a very specific version of the OpenSSL software, and only when a specific set of options were used
-
-
HP wins $47M contract to support HSPD-12 implementation
On Monday the U.S. General Services Administration (GSA) announced it had awarded Hewlett Packard a one-year contract worth as much as $47 million to support government-compliance with Homeland Security Presidential Directive-12 (HSPD-12)
-
-
Cybersecurity firm discovers mutant computer viruses
Cybersecurity firm BitDefender recently announced that it had uncovered multiple instances of computer viruses infecting other viruses to create “Frankenware”
-
-
DHS to work with Netherlands on cybersecurity
On Wednesday DHS Secretary Janet Napolitano signed a letter of intent to work with the Netherlands on several critical cybersecurity initiatives
-
-
Helping software to help improve software
The earlier a problem is detected, the easier it can be solved; before implementing complex programs in a time-consuming process, computer scientists also want to know whether they will reach the desired performance
-
-
House grills DHS for monitoring Twitter, Facebook
Earlier this year reports surfaced that DHS had awarded General Dynamic an $11 million contract to engage in monitoring of social networks; members of both parties including blasted DHS officials for potentially violating the First Amendment and collecting information on citizens engaged in protected political speech
-
-
Quantum physics makes possible perfectly secure cloud computing
Computer data processing and storage are increasingly done in the cloud; the challenge in cloud-based system is to ensure that clients’ data stays private; researchers have now shown that perfectly secure cloud computing can be achieved with quantum computers
-
-
Quantum technique for secret messaging
Quantum cryptography is the ultimate secret message service; new research shows it can counter even the ultimate paranoid scenario: when the equipment or even the operator is in the control of a malicious power
-
-
Cell phone hackers can track your location without your knowledge
Using a cheap phone, readily available equipment, and no direct help from a service provider, hackers could listen to unencrypted broadcast messages from cell phone towers
-
-
Anonymous takes down U.S. weapons manufacturer
On Monday hacktivists from the group known as Anonymous announced that they had taken down the website of Combined Systems, a U.S. based weapons manufacturer; the weapons company drew the ire of Anonymous as well as human rights groups for its role in the suppression of the Arab Spring protests across the Middle East
-
-
Satellite telephony is unsafe
In some regions of the world standard cell phone communication is still not available; in war zones, developing countries and on the high seas, satellite phones are used instead; the system, using an encryption algorithms of the European Telecommunications Standards Institute (ETSI), was considered unbreakable; in less than an hour, and with simple equipment, researchers found the crypto key which is needed to intercept telephone conversations
-
-
Anonymous takes down DHS website in hacking spree
Last Friday the hacktivist group known as Anonymous momentarily took down DHS’s homepage along with several other high-profile attacks in a coordinated campaign
-
-
Justice Department appoints new CIO
Last Friday the Justice Department appointed Luke McCormack as the agency’s new chief information officer
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.