-
Tech projects to receive big chunk of second wave of stimulus spending
Information technology projects will receive significant funds, implementation director says;
-
-
New report says U.S. Air Force should prepare for cyberwar
New Rand Corp. report argues that the U.S. military branches must treat cyberwar as another emerging field of battle — one that both amplifies the threat of physical combat and presents new tactical challenges unfamiliar to everyone, not just the armed forces
-
-
China bolsters its information warfare capabilities
One of the chief strategies driving the process of modernization (known in China as “informatization”) in the PLA is the coordinated use of CNO, electronic warfare (EW), and kinetic strikes designed to
strike an enemy’s networked information systems, creating “blind spots” that PLA forces could exploit at predetermined times or as the tactical situation warranted -
-
Robust hierarchical metropolitan quantum cryptography network
The security of a majority of classical cryptography is based on the complexity of the cipher algorithms and the development of distributed computing and specific hacking chips; this may no longer be sufficient, as quantum computing has become a serious threat to classical cryptography; the solution: quantum encryption
-
-
iPhones, social networking add to IT security woes
The security staff at private and government organizations have new security problems to contend with: smartphones and social networking
-
-
UK.gov's G Cloud may have security silver lining after all
Cloud computing offers many benefits, but enhanced security is not one of them — or is it? An expert says that the emergence of cloud computing is making it possible to take a new approach to security; until now, the U.K. government has kept its work on information security in specialist bodies such as GCHQ and CESG, separate from the development of business functions; “The cloud gives us the opportunity to get the specification right before we get too far down the track,” he says
-
-
The personal spy: the smartphone in your pocket may be spying on you, II
The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details
-
-
Growing demand for IT forensics experts
As reliance on the Internet increases, so do Internet-related crimes; the growing need to investigate such crimes and find out the culprits and their methods has increased demand for IT forensics experts
-
-
The personal spy: the smartphone in your pocket may be spying on you, I
The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details
-
-
The Internet to be made more useful for the U.S. military
DARPA awarded Lockheed Martin a $31 million contract to lead a team which will redesign the Internet to make it more suitable for military use
-
-
It's the people, stupid
People are still the weakest link in computer and Internet security, study finds
-
-
Michigan airport turns off Web site over malware risk
The Gerald R. Ford International Airport in Grand Rapids temporarily pulled its site in response to an unspecified malware threat
-
-
DHS's public Web sites vulnerable
DHS’s Inspector General evaluated the nine most popular of the department’s 125 public-facing Web sites, and found that while the component agencies responsible for the Web sites followed DHS policies when setting them up, they left too much to chance afterward
-
-
Home robots may be hackers' next target
Home surveillance robots could be turned against their users, researchers say; few people have home robots now, but reliance on them grows for stay-at-home elderly and the sick
By
-
-
UN: Next world war may be in cyberspace
Countries have become critically dependent on technology for commerce, finance, health care, emergency services, and food distribution; “Loss of vital networks would quickly cripple any nation, and none is immune to cyberattack,” expert says
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.