-
Über-hacker Albert "Segvec" Gonzalez's plea scuttled by indictment
Gonzalez’s attorney was close to taking responsibility for his crimes and agreeing to a sentence of about twenty years when hew was indicted on new counts on Monday
-
-
DHS plans wiki for agencies
Wiki will be used by DHS’s National Cyber Security Center (NCSC) and the six other federal cybersecurity centers as a collaboration tool and a way to develop improved situational awareness, communication and information sharing
-
-
TeleContinuity, SRA to support national communication system
TeleContinuity will help the National Communications System’s (NCS) national security and emergency preparedness programs in providing critical continuity of communications expertise, preserving the ability of federal agencies to maintain Continuity of Government (COG) when it is most vital - during disasters, emergencies, evacuations, or pandemics
-
-
Making software safer
More and more security systems in aircraft and motor vehicles rely on software for their operation; Aussie researchers develop away to make sure such software is safe
-
-
NIST publishes final version of new cybersecurity recommendations
NIST’s cybersecurity recommendations for government aim to create a unified framework which will result in the defense, intelligence and civil communities using a common strategy to protect critical federal information systems and associated infrastructure
-
-
Digital certificate standard compromised by hackers
Researchers demonstrated exploits against the X.509 standard for digital certificates used by Secure Sockets Layer; Deputy Defense Secretary Robert Lentz, DOD’s chief information assurance officer, cited identity authentication as a key security challenge for the department
-
-
University of Detroit Mercy receives cyber security research contract
The aim of the $551,500 federal contract is to develop and disseminate the knowledge necessary to ensure that the software that enables America’s business and critical infrastructure is safe and secure
-
-
Cobham reports a 32 percent increase in first-half profits
Company benefits from strategic investments in military and government markets; its work with M/A-COM, which it acquired from Tyco Electronics in September 2008, had resulted in increased technology collaboration and new contract awards
-
-
Cybersecurity is now a must for the grid, II
Cyber security has become a permanent part of running an electric plant because connectivity to the outside world is inevitable; plants are bringing together the expertise of consultants, vendors, and their IT departments to ensure that they are well protected
-
-
IT graduate sues school over failure to land a job
Tina Thompson majored in IT studies at Monroe College in the Bronx, New York; she has failed to find an IT job, so she is suing the school for reimbursement of her tuition — $70,000 — plus an additional $2,000 “for the stress I have been going through looking for a full-time job”
-
-
Hacking schools flourish in China
Chinese hackers have been on the forefront of sustained hacking and disruption campaign against Western business and government networks — some do it for fun, other for profit, but many do so on behalf of the Chinese government and its many intelligence and military agencies; ever wondered where all these hackers come from? “Hacker schools” are big business in China, generating $34.8 million last year
-
-
Cybersecurity is now a must for the grid, I
In past years, electric plants have not worried about cyber security because they did not connect to the outside world; new data systems have changed that for most plants; plants bolster cyber security as NERC starts audits on Internet safety
-
-
Acting cybersecurity czar resigns
Melissa Hathaway, acting White House cybersecurity czar who was in charge of preparing the 60-day cybersecurity reviews, resigned; she lost favor with the president’s economic team after she said it should consider options for regulating some private-sector entities to ensure they secure their networks; being a Bush administration hold-over did not help
-
-
Anti-theft software creates security hole
A piece of anti-theft software built into many laptops at the factory opens a serious security hole
-
-
U r pwned: text messaging as a hacking tool
Text messages appear on mobile phones without any interaction from the user, and sometimes with limited interference from the cellular network operators — giving criminals an opening to break into those devices
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.