-
Facebook helps foil arms-smuggling deal
With the help of Facebook, federal investigators were able to arrest a man on charges of illegally shipping weapons parts internationally after he “friended” his weapons buyer
-
-
L-3, Virginia Tech in cybersecurity partnership
L-3 Communicationshas formed a cooperative partnership in cybersecurity research and development with Virginia Tech’s Ted and Karyn Hume Center for National Security and Technology; the company says that this new partnership will enhance L-3’s ability to deliver innovative national security solutions
-
-
Lockheed Martin hosts 150 Md. students in cybersecurity event
Top performing Science, Technology, Engineering and Mathematics (STEM) high school students from Maryland gathered yesterday at Lockheed Martin’s NexGen Cyber Innovation & Technology Center to explore cyber security careers, education, and to promote safe online practices through a series of lessons and interactive stations
-
-
RSA blames nation-state for SecurID cyberattack
Last week at a press conference in London, RSA executives revealed more details about the cyberattack that stole information regarding the company’s SecurID authentication tokens in March; Art Coviello, the executive chairman of RSA, said two well-known hacker groups as well as a nation-state collaborated to infiltrate the company’s networks
-
-
SEC requires businesses to disclose cyberattacks
Last week, the U.S. Securities and Exchange Commission (SEC) unveiled new guidelines that will make it mandatory for companies to report cyberattacks against their networks as well as the costs associated with them to their investors
-
-
Business group: cybersecurity critical to U.S. economic, national security
The Technology CEO Council says that Private sector steps to strengthen the U.S. digital infrastructure combined with new policies and government actions are important to America’s national and economic security
-
-
Software restricts access to sensitive to specific locations
Researchers have created software to remotely put smart phones under lockdown — an innovation that could aid labs doing sensitive research, secure government and military facilities, and keepers of medical records
-
-
Collaborative social media site for ID and biometric professionals
Cost overruns, project delays, and poor performance results have long been the bane of government projects, at times resulting in expensive high-profile failures; to help reduce costs and ensure that government projects meet targeted needs, a new collaborative Web-based information-sharing community aimed at bringing together identity and biometric industry professionals, academics, researchers, and government and commercial procurement officers is slated to open
-
-
Also noted
SEC Says Companies Should Disclose Cyber-Incidents, Risks to Investors | Few in California have insurance for a big earthquake | N.Y. non-profits receive millions in security grants from 2006 to 2009 | Mexican smugglers tunnel beneath Arizona parking lots | ‘Israel will target prisoners who return to terrorism’ | Thai Floods Threaten Public and Private Research | New Metal Deposits Found at Rare Earth Mine | Lawmakers suggest treating drug cartels as terrorist organizations | Private U.K. security firm takes inmates to court in taxis
-
-
Sony hit by hackers again, 93,000 accounts compromised
Once again Sony has been the victim of a major cyberattack. This time as many as 93,000 accounts have been compromised from Sony Entertainment Network, PlayStation Network, and Sony Online Entertainment
-
-
Michigan to launch cyber command center and defense teams
To help boost the state’s economy and its role in securing the nation’s data networks, Michigan recently announced that it plans to launch a cyber command center and cyber defense response teams
-
-
Securing smartphones in battle
As the military moves to incorporate smartphones on the battlefield, critics worry that the inherent security flaws in the devices could result in major data breaches or cybersecurity attacks on the military’s networks
-
-
German police uses backdoor Trojan to monitor Skype calls
A backdoor Trojan capable of monitoring online activity and recording Skype calls has been detected — and is allegedly being used by the German police force
-
-
Tweeting may help in disasters
Social networks like Twitter cannot help prevent disasters, but can quickly correct misinformation resulting from false rumors, thus preventing possible further loss of lives
-
-
Cyber war may never happen
Cyber war, long considered by many experts within the defense establishment to be a significant threat, if not an ongoing one, may never take place according to one expert
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.