-
Trojan horse virus allows hackers, law enforcement, to eavesdrops on VoIP
A Trojan horse virus allows hackers, but also law enforcement, to record VoIP calls; law enforcement in the U.S. would presumably need a court order to surveil someone’s Skype calls, but the barriers to deploying the virus might be lower for intelligence agencies and authorities in other countries
-
-
U.S. has a flawed approach to cyber security
Critics call on courts to recognize that obsolete computer systems are a major cause of security breaches; “As the courts probe (the) causative issues, it will become increasingly clear that computer systems’ failure to embed automated alerts is the root problem”
-
-
DHS' Cyber Storm III to test U.S. national cyber response plan
One objective of Cyber Storm III is to harmonize the various alert level systems used in government and the private sector so that all stakeholders at least speak the same language
-
-
President to be able to seize private-sector networks in an emergency
A bill being drafted in Congress (the is a revised bill — the original went further) permits the president to seize temporary control of private-sector networks during a cybersecurity emergency
-
-
DHS, industry release plan for evaluating IT risk
The recommendations provide tech developers and managers with a model for identifying and mitigating risk in IT solutions that serve companies in the critical infrastructure sector and other markets
-
-
U.K. banks lax on Internet fraud
U.K. Payments Administration (formerly APACS) reports that online banking fraud reached £52.5 million in 2008, more than doubling from the £22.6 million recorded in 2007; not all banks take measures which are adequate
-
-
Cybercriminals learn how to increase the longevity of malware
Cybercriminals have stopped producing as much new malware to maintain their criminal activity, opting for a cheaper approach: registering new domains and spreading the malware across as many different Web sites and domains as possible
-
-
Precipitous -- and inexplicable -- drop in phishing e-mails
A new report from IBM shows a big drop in the volume of “phishing” e-mails, in which fraud artists send what looks like a legitimate message from a bank or some other company
-
-
Russia's cyber warfare strategies, II
The August 2008 Georgia cyber campaign showed that Russia’s offensive information operations have improved considerably since the April-May 2007 conflict with Estonia
-
-
Cloud computing, social network to help software security
The difference between Immunet’s offering and other companies’ products, say its founders, is the software’s ability to protect digital communities — those users connected together via social networks such as instant messaging, Facebook, or Twitter
-
-
Fake DHS e-mail used to spread malware
DHS warns that some e-mails purporting to be from the department’s intelligence division were fake and contained malicious software
-
-
Web and network firewalls remain central to network defense
Many vendors try to position their solutions as compliance-focused, but firewall-related tools may offer the best value in meeting wide-ranging compliance objectives
-
-
Russia's cyber warfare strategies, I
The August 2008 Georgia-Russia war was accompanied by a sustained, well-integrated, and pre-planned information warfare campaign against Georgia’s Internet structure
-
-
U.S. Air Force launches cyber command
The 24th Air Force will “provide combat-ready forces trained and equipped to conduct sustained cyber operations”
-
-
Gallagher PowerFence system secures Ports of Auckland
A key factor in the decision to install a PowerFence system was that it is an intelligent system; it consists of independent fence zones which can be uniquely identified to accurately detect attack attempts to facilitate a fast appropriate response
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.