-
Experts offer insights on current security issues
Attendees at the ASIS annual event were offered the latest insights into the latest thinking on a range of security issues, from protecting the hospitality industry to protecting house of worship, and much more
-
-
Open-System Vendors demo IP interoperability
Exacq Technologies, Firetide, IQinVision, and Pivot3 are showing how standards-based solutions from open-system vendors can be integrated and supported in the field
-
-
Improving home computer security
Researchers have developed a specification for security policy on home networks that can guarantee reliability and availability; the specification also takes into account authentication, authorization, security policy deployment so that all users in the home are not only protected from malware but also can help ensure everyone can use the network when they need to
-
-
Malware lingers on for months on infected PCs
New study says that if computer systems are not disinfected quickly after infection, then infection tends to linger around indefinitely, possibly until the point users exchange compromised boxes for new machines
-
-
U.S. government takes leap into the Internet cloud
Vivek Kundra, the White House CIO, said wider adoption of cloud computing solutions would allow federal agencies to “fulfill their missions at lower cost, faster, and ultimately, in a more sustainable manner”
-
-
How cloud computing can help the U.S. government -- and citizens
The administration has seen benefits in the way private industry uses cloud computing, and intends to mirror these benefits; ultimately, the idea is to make it simple for agencies to procure the applications they need
-
-
U.S. Government recommends weighing laptop before and after visit to China
The U.S. government urges travelers to follow extremely strict policies for visits to China which extend far beyond standard software protection; the policies encourage them to leave their standard IT equipment at home and to buy separate gear only for use in China
-
-
Swayze's death, Williams's outburst, exploited to serve up fake anti-virus
Cyber criminals exploit the interest of people in breaking news by creating Web sites designed to rip off users searching for more information; surfers visiting these sites are warned of non-existent security problems in a bid to trick them into buying software of little or no utility
-
-
Cyber criminals go after small businesses
Small and medium-sized businesses that do not have the resources to keep updating their computer security; cybercriminals find it easier to target such businesses
-
-
Cocoon Data: Securing Internet communication
Cocoon Data’s Secure Envelopes is a way of electronically “wrapping” sensitive files, e-mail attachments, and other data to keep them from being seen by unintended eyes
-
-
FCC releases report on agency's preparedness for major emergencies
The FCC has an important role to play in ensuring that the U.S. communications infrastructure serves the public safety needs; a new report concludes that the agency largely meets this challenge, but that there are a few area where matter can be improved
-
-
New data protection approach
New data security system developed by Israeli researchers automatically protects sensitive data because it travels with the data even when it is saved to removable devices like a USB flash drive
-
-
Einstein 3 raises privacy concerns
New cyber security system — Einstein 3 — will be rolled out across all U.S. government agencies; in addition to detecting malicious software, the system can read e-mails and other Internet traffic
-
-
Code-breaking quantum algorithm runs on a silicon chip
fifteen years ago, Peter Shor, a computer scientist at MIT, predicted that quantum computers could beat even the most powerful supercomputers and crack the widely used RSA encryption algorithm; he was right: University of Bristol researchers built a silicon chip that can do just that
-
-
Trojan horse virus allows hackers, law enforcement, to eavesdrops on VoIP
A Trojan horse virus allows hackers, but also law enforcement, to record VoIP calls; law enforcement in the U.S. would presumably need a court order to surveil someone’s Skype calls, but the barriers to deploying the virus might be lower for intelligence agencies and authorities in other countries
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.