• Japanese pharmaceutical crippled by insider cyberattack

    Last week a disgruntled former contract employee pleaded guilty for severely disrupting the networks of Shionogi, a Japanese pharmaceutical firm; the attacks were so severe that they crippled Shionogi’s operations for “a number of days, leaving employees unable to ship products, to cut checks or even communicate via email,” according to court documents

  • Hong Kong arrests stock exchange hacker

    Last Friday authorities in Hong Kong announced that they had arrested a man for hacking into the city’s stock exchange and disrupting the trades of seven companies; two weeks ago the Hong Kong stock exchange’s website was hit with a malicious attack that caused several firms including global banking giant HSBC and the international airline Cathay Pacific to suspend trading for half a day

  • Anonymous retaliates against BART

    The hacking collective Anonymous released personal data on Sunday belonging to more than 2,000 public transport customers in the San Francisco area in retaliation for the Bay Area Rapid Transit (BART) system’s shutdown of mobile phone service on Thursday night

  • ManTech wades into private cybersecurity market

    In an increasing trend, more traditional defense contractors are seeking to expand their businesses by entering the burgeoning field of cybersecurity for commercial companies; after disposing of its private sector cybersecurity business in 2002, ManTech International is seeking to enter the market once more

  • Attackers have advantage in cyberspace, says cybersecurity expert

    Homeland Security NewsWire’s executive editor Eugene Chow recently caught up with Bruce Schneier, a cybersecurity expert and the author of several bestselling books, including “Applied Cryptography,” “Secrets and Lies,” and “Beyond Fear”; in the interview Schneier discusses the recent politically motivated cyberattacks by Anonymous and AntiSec, securing U.S. networks against counterfeit computer chips, and President Obama’s proposed cybersecurity plan

  • London police use smartphones, social network to identify rioters

    The rioters in London — and now, in other British cities — have been using Blackberries to outmaneuver the police; communicating via BlackBerry instant-message technology, as well as by social networking sites like Facebook and Twitter, the rioters repeatedly signaled fresh target areas to those caught up in the mayhem; RIM has now agreed to cooperate with Scotland Yard to turn over protestors using the service to coordinate their assaults; the police is also releasing CCTV images of the rioters to a group using face recognition technology to identify and condemn rioters; the police is also using Flickr, Tublr, and Twitter to spot and identify participants in the riots

  • Anonymous hacker collective hits rural law enforcement

    In its latest exploit, global hacker collective Anonymous claimed to release ten GB of stolen data from more than seventy rural sheriff’s departments across the United States, leaking sensitive information that could compromise the agencies’ investigations

  • Cost of cyberattacks on the rise

    A new study shows that cybercrime is costing corporations 56 percent more than last year; the study conducted by the Ponemon Institute and sponsored by ArcSight, an HP company, found that the median cost of cybercrimes for the fifty companies surveyed was $5.9 million; the increase in costs were largely due to hackers using stealthier techniques

  • Microsoft offers $250,000 in cybersecurity competition

    Last Wednesday at the annual Black Hat and Defcon convention for hackers, Microsoft announced a competition for cyber security specialists in which it would award $200,000 to the individual who develops the most innovative computer protection technology

  • DHS officials: Stuxnet can morph into new threat

    Government cybersecurity experts warn that the Stuxnet virus, which damaged Iran’s nuclear centrifuges, could morph into something even more destructive; DHS officials worry that hackers could design more complex versions of the virus that can evade detection and bypass existing software fixes

  • Researchers show how to unlock, start a car remotely

    Two researchers at the Black Hat event in Las Vegas demonstrated they could send commands from a laptop to unlock the doors of a Subaru Outback — and then start the car; they said that in addition to vehicles, many other GPS-tracking devices, 3G security cameras, urban traffic control systems, SCADA sensors, and home controls and systems are also telephony-enabled and, as a result, susceptible to attack

  • New drone listens in on cell phone calls and hacks Wi-Fi networks

    At this week’s annual Defcon security conference for hackers, two hobbyists will showcase their sophisticated unmanned Wi-Fi detecting, cell-phone eavesdropping spy drone; the drone was assembled using an old Army target drone that had been converted to run on electric batteries and is now equipped with an HD camera, eleven antennas, and a cigarette pack sized computer that is loaded with hacking tools

  • Detecting fake Web sites

    A team of researchers develop a new — and more reliable — way to detect fake Web sites; the team developed five categories with thousands of cues, finding that the best results were attained when utilizing thousands of highly visible and also deeply embedded cues, such as placement, URL length, the number of links, characters types on the site and how thorough the site’s “frequently asked questions” section is detailed, among other features

  • Next generation firewall market to grow 24 percent annually through 2014

    The global next-generation firewall market will grow at a CAGR of 24 percent over the period of 2010-14; the market is currently being driven by the increasing number and intensity of security threats on the Web

  • DHS warns utilities at risk from insider threats

    Last week DHS warned critical infrastructure operators like chemical facilities, nuclear power plants, and electric utility companies that terrorists could be targeting major facilities from the inside; officials cautioned that “violent extremists have, in fact, obtained insider positions,” and that “outsiders have attempted to solicit utility-sector employees” for damaging physical and cyber attacks.