• Über-hacker Albert "Segvec" Gonzalez's plea scuttled by indictment

    Gonzalez’s attorney was close to taking responsibility for his crimes and agreeing to a sentence of about twenty years when hew was indicted on new counts on Monday

  • DHS plans wiki for agencies

    Wiki will be used by DHS’s National Cyber Security Center (NCSC) and the six other federal cybersecurity centers as a collaboration tool and a way to develop improved situational awareness, communication and information sharing

  • TeleContinuity, SRA to support national communication system

    TeleContinuity will help the National Communications System’s (NCS) national security and emergency preparedness programs in providing critical continuity of communications expertise, preserving the ability of federal agencies to maintain Continuity of Government (COG) when it is most vital - during disasters, emergencies, evacuations, or pandemics

  • Making software safer

    More and more security systems in aircraft and motor vehicles rely on software for their operation; Aussie researchers develop away to make sure such software is safe

  • NIST publishes final version of new cybersecurity recommendations

    NIST’s cybersecurity recommendations for government aim to create a unified framework which will result in the defense, intelligence and civil communities using a common strategy to protect critical federal information systems and associated infrastructure

  • Digital certificate standard compromised by hackers

    Researchers demonstrated exploits against the X.509 standard for digital certificates used by Secure Sockets Layer; Deputy Defense Secretary Robert Lentz, DOD’s chief information assurance officer, cited identity authentication as a key security challenge for the department

  • University of Detroit Mercy receives cyber security research contract

    The aim of the $551,500 federal contract is to develop and disseminate the knowledge necessary to ensure that the software that enables America’s business and critical infrastructure is safe and secure

  • Cobham reports a 32 percent increase in first-half profits

    Company benefits from strategic investments in military and government markets; its work with M/A-COM, which it acquired from Tyco Electronics in September 2008, had resulted in increased technology collaboration and new contract awards

  • Cybersecurity is now a must for the grid, II

    Cyber security has become a permanent part of running an electric plant because connectivity to the outside world is inevitable; plants are bringing together the expertise of consultants, vendors, and their IT departments to ensure that they are well protected

  • IT graduate sues school over failure to land a job

    Tina Thompson majored in IT studies at Monroe College in the Bronx, New York; she has failed to find an IT job, so she is suing the school for reimbursement of her tuition — $70,000 — plus an additional $2,000 “for the stress I have been going through looking for a full-time job”

  • Hacking schools flourish in China

    Chinese hackers have been on the forefront of sustained hacking and disruption campaign against Western business and government networks — some do it for fun, other for profit, but many do so on behalf of the Chinese government and its many intelligence and military agencies; ever wondered where all these hackers come from? “Hacker schools” are big business in China, generating $34.8 million last year

  • Cybersecurity is now a must for the grid, I

    In past years, electric plants have not worried about cyber security because they did not connect to the outside world; new data systems have changed that for most plants; plants bolster cyber security as NERC starts audits on Internet safety

  • Acting cybersecurity czar resigns

    Melissa Hathaway, acting White House cybersecurity czar who was in charge of preparing the 60-day cybersecurity reviews, resigned; she lost favor with the president’s economic team after she said it should consider options for regulating some private-sector entities to ensure they secure their networks; being a Bush administration hold-over did not help

  • Anti-theft software creates security hole

    A piece of anti-theft software built into many laptops at the factory opens a serious security hole

  • U r pwned: text messaging as a hacking tool

    Text messages appear on mobile phones without any interaction from the user, and sometimes with limited interference from the cellular network operators — giving criminals an opening to break into those devices