-
Denying denial-of-service attacks
Denial of Service (DoS) and distributed Denial of Service (DDoS) attacks involve an attempt to make a computer resource unavailable to its intended users; new filtering system could protect networks from such attacks
-
-
Experts offer insights on current security issues
Attendees at the ASIS annual event were offered the latest insights into the latest thinking on a range of security issues, from protecting the hospitality industry to protecting house of worship, and much more
-
-
Open-System Vendors demo IP interoperability
Exacq Technologies, Firetide, IQinVision, and Pivot3 are showing how standards-based solutions from open-system vendors can be integrated and supported in the field
-
-
Improving home computer security
Researchers have developed a specification for security policy on home networks that can guarantee reliability and availability; the specification also takes into account authentication, authorization, security policy deployment so that all users in the home are not only protected from malware but also can help ensure everyone can use the network when they need to
-
-
Malware lingers on for months on infected PCs
New study says that if computer systems are not disinfected quickly after infection, then infection tends to linger around indefinitely, possibly until the point users exchange compromised boxes for new machines
-
-
U.S. government takes leap into the Internet cloud
Vivek Kundra, the White House CIO, said wider adoption of cloud computing solutions would allow federal agencies to “fulfill their missions at lower cost, faster, and ultimately, in a more sustainable manner”
-
-
How cloud computing can help the U.S. government -- and citizens
The administration has seen benefits in the way private industry uses cloud computing, and intends to mirror these benefits; ultimately, the idea is to make it simple for agencies to procure the applications they need
-
-
U.S. Government recommends weighing laptop before and after visit to China
The U.S. government urges travelers to follow extremely strict policies for visits to China which extend far beyond standard software protection; the policies encourage them to leave their standard IT equipment at home and to buy separate gear only for use in China
-
-
Swayze's death, Williams's outburst, exploited to serve up fake anti-virus
Cyber criminals exploit the interest of people in breaking news by creating Web sites designed to rip off users searching for more information; surfers visiting these sites are warned of non-existent security problems in a bid to trick them into buying software of little or no utility
-
-
Cyber criminals go after small businesses
Small and medium-sized businesses that do not have the resources to keep updating their computer security; cybercriminals find it easier to target such businesses
-
-
Cocoon Data: Securing Internet communication
Cocoon Data’s Secure Envelopes is a way of electronically “wrapping” sensitive files, e-mail attachments, and other data to keep them from being seen by unintended eyes
-
-
FCC releases report on agency's preparedness for major emergencies
The FCC has an important role to play in ensuring that the U.S. communications infrastructure serves the public safety needs; a new report concludes that the agency largely meets this challenge, but that there are a few area where matter can be improved
-
-
New data protection approach
New data security system developed by Israeli researchers automatically protects sensitive data because it travels with the data even when it is saved to removable devices like a USB flash drive
-
-
Einstein 3 raises privacy concerns
New cyber security system — Einstein 3 — will be rolled out across all U.S. government agencies; in addition to detecting malicious software, the system can read e-mails and other Internet traffic
-
-
Code-breaking quantum algorithm runs on a silicon chip
fifteen years ago, Peter Shor, a computer scientist at MIT, predicted that quantum computers could beat even the most powerful supercomputers and crack the widely used RSA encryption algorithm; he was right: University of Bristol researchers built a silicon chip that can do just that
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.