-
Personal information of 80,000 NYPD officers stolen
A NYPD pension telecommunications director swiped backup tapes that contained addresses, Social Security numbers, medical records, and direct-deposit information on nearly 80,000 current and retired police officers
-
-
New cybersecurity guidelines simplify, prioritize protections
NIST issues guidelines which aim to simplify the thousands of pages of cybersecurity guidance from the National Institute of Standards and Technology; managers say the NIST guidance is hard to implement and harder to audit
-
-
Debunking IT myths
As IT spreads, so do IT myths and legends; two experts debunk some of the more popular myths
-
-
The 25 most dangerous places for offshore outsourcing
Are you thinking about outsourcing your company’s back-room work to companies in Bogota, Bangkok, or Johannesburg? Think again; here is a list of the 25 worst outsourcing cities
-
-
U.K. pushes data infrastructure protection
U.K. government announces £6 million of research funding in the field of data infrastructure protection; application deadline is 23 April
-
-
President's proposed 2010 budget shows DHS priorities
Proposed budget increase DHS budget by 6 percent; priorities include cyber security, helping TSA screen travelers, increase bomb disposal and counter-IED capabilities, border security, emergency response
-
-
New software allows laptops to talk back boldly to laptop thieves
Your laptop has been stolen? New software allows you to tell those thieves exactly — and when we say exactly, we mean exactly — what you think of them; software also helps police locate the stolen computer
-
-
Intelligence, law enforcement face another hurdle: encrypted VoIP
The intelligence community and law enforcement already are concerned about the difficult they have eavesdropping in Skype communications; a U.K. start-up is going to make life more difficult for them by encryption VoIP communications and concealing more conversations
-
-
EU may investigate VoIP eavesdropping
Italian anti-crime authorities have asked the EU to look into regulating VoIP communication encryption; the Italian authorities presented evidence that crime rings and prostitution networks use Skype for the specific purpose of frustrating police investigators
-
-
Guidelines for government, private IT security issued
A coalition of government and private organizations releases a preliminary set of guidelines for IT security controls; guidelines will become a foundation for a standardized approach to securing the nation’s critical information infrastructure
-
-
Institute: Better coordination needed for cybersecurity R&D
I3P calls for improved coordination for cybersecurity research and development efforts
-
-
New study emphasizes the risk posed by insider threats
Many information security programs focus on preventing unauthorized outsiders from accessing an information system; insiders, however, often are in a better position to cause just as much damage because they are trusted by their organization
-
-
U.S. under growing cyber attacks
The number of cyber attacks on U.S. government computers and networks grow; there were 5,488 tracked incidents of unauthorized access to U.S. government computers and installations of hostile programs in 2008, compared to 3,928 such incidents in 2007, and 2,172 in 2006
-
-
DHS receives IT money in stimulus package
DHS receives a $2.8 billion boost from the new stimulus package; largest single item is for TSA’s installation of checked baggage explosive detection systems
-
-
Unisys: Technology "consumerization," mobility risks key drivers of security investments
A Unisys briefing says that the growing pervasiveness of technology consumerization and mobility opens businesses to new risks across a broader spectrum; economy compels greater need for collaboration, more intelligent systems, and better fraud prevention; biometric use and acceptance also to increase
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.