-
Tweeting may help in disasters
Social networks like Twitter cannot help prevent disasters, but can quickly correct misinformation resulting from false rumors, thus preventing possible further loss of lives
-
-
Cyber war may never happen
Cyber war, long considered by many experts within the defense establishment to be a significant threat, if not an ongoing one, may never take place according to one expert
-
-
National Cybersecurity Awareness Month launches today
DHS, in announcing the launching of the eighth annual National Cybersecurity Awareness Month (NCSAM), says that this is why cybersecurity is a shared responsibility, and each of individual and organization has a role to play; “Emerging cyber threats require the engagement of our entire society including government and law enforcement, the private sector, and members of the public,” DHS says in a statement
-
-
New report highlights Zeus Trojan's enhancement
New report highlights enhancements of the notorious Zeus Trojan; the enhancements help Zeus undermine tacking and detection aimed at thwarting Zeus
-
-
Better cloud security
Researchers have developed a new, experimental technique better to protect sensitive information in cloud computing — without significantly affecting the system’s overall performance
-
-
GAO: poor security procedures put sensitive government data at risk
A recently released Government Accountability Office (GAO) report found that poor information security practices at U.S. government agencies have put sensitive data and servers at risk
-
-
Registration for CyberPatriot IV competition to end this week
With less than a week left before registration closes, CyberPatriot IV, the National High School Cyber Defense Competition, has more than 850 teams registered; this competition is attracting high school educators across the United States; the structure of the competition provides students hands-on learning while competing virtually against their peers and introduces many to the idea of cyber security as a profession
-
-
DHS begins move to cloud
Last week, federal officials announced that DHS had made its first move to begin consolidating and migrating many of its public websites to cloud servers to reduce costs
-
-
Securing financial infrastructure against cyberattacks
To protect the U.S. financial sector from increasingly ubiquitous and costly cyberattacks, DHS plans to work more closely with other federal agencies as well as the private sector to defend against hackers
-
-
Living bacteria for perfect encryption system
Researchers have developed fluorescent bacteria that encode secret messages, creating, in effect, a living invisible ink; this method could be harnessed for secret communications as well as for anti-counterfeiting; messages may be encoded by genetically engineering bacteria to produce fluorescent colored proteins, then printing them in a grid
-
-
Strong growth for mobile phone embedded biometric security solutions
New study says that the conditions are now right to create a strong market for mobile phone embedded biometric security solutions; the current global user base of four million users in 2011 is set to grow to 39 million users by 2015
-
-
Cyber security job board channel launched
The growing demand for employees with cybersecurity certification lead a leading job-search company to offer cyber security hiring channel, focusing on employment and recruiting in the information assurance field; the company says it has created the cyber security job board to target the expanding field of cyber security
-
-
ISPs asked to help fight hackers
DHS and the Department of Commerce are considering a proposal that would request assistance from Internet-service providers in combatting computer viruses known as botnets
-
-
ASIS 2011 -- combating cyber extremists
At this year’s ASIS International conference, security experts will explore the effect of the Internet on terrorism, how extremist organizations are using it, and what can be done to stop it; the web has largely proven to be a boon to society, but malicious actors like terrorists have used the Internet to disseminate their radical ideas, recruit new members, and share weapons and bomb building training manuals; terrorist websites have proven to be reliable sources for intelligence as well as dangerous meeting places, but shutting them down has proven to be more complicated than anticipated
-
-
Cyber attacks on U.S. are becoming more lethal
The head of the U.S. Cyber Command said that cyber attacks on the United States are escalating from large-scale theft and disruption of computer operations to more lethal attacks that destroy systems and physical equipment
-
More headlines
The long view
Our Online World Relies on Encryption. What Happens If It Fails?
Quantum computers will make traditional data encryption techniques obsolete; BU researchers have turned to physics to come up with better defenses.