-
McAfee acquires MX Logic to enhance cloud security
McAfee acquires MX Logic for $140 million; MX Logic has 40,000 customers and four million end users; the deal is designed to bolster McAfee’s existing “security as a service” portfolio; McAfee, alongside Panda and Trend Micro, is among the most aggressive players in the security market in talking up the benefits of cloud-based architectures
-
-
Clampi virus targets businesses' financial accounts
A new virus is spreading, specifically targeting companies’ financial accounts; at least 500,000 computers have been infected by Clampi since March
-
-
Fort Meade leads the competition for new U.S. cyber center site
Defense Secretary Robert Gates is recommending the Defense Department create a new agency, U.S. Cyber Command, at Fort Meade, Maryland; if Fort Meade is chosen, Maryland will see the addition of as many as 50,000 government and contracting jobs, bringing in salaries of about $1.7 billion annually
-
-
Cyber-criminals targeting social networks
Cyber-criminals are drawn to the wealth of personal information supplied by users of social networks
-
-
Apple says jailbreaking may knock out transmission towers
The Electronic Frontier Foundation (EFF) asked the U.S. Copyright Office to instruct Apple to allow “jailbreaking ” — that is, modification of the iPhone’s software without Apple’s approval; Apple responded that modifying the iPhone’s operating system could crash a mobile phone network’s transmission towers or allow people to avoid paying for phone calls
-
-
Addressing cloud computing confusion
New report sheds light on federal government cloud computing progress; industry and government are at equal cloud adoption pace
-
-
Northrop Grumman opens new cybersecurity center
Northrop opens its Cyber Security Operations Center (CSOC) in suburban Maryland; the center will monitor the company’s more than 105,000 clients and 10,000 servers worldwide; more than 1.5 billion daily cyber events that occur on the Northrop Grumman network
-
-
Defcon, Black Hat to open this week
Leading cybersecurity events to open in Las Vegas this week; if you prefer security shows at which the speakers favor black T-shirts and dyed hair over suits and ties, and where goth-attired groupies and script kiddies hunkered over laptops line the hallways at all hours of the night, you should attend
-
-
U.S. cybersecurity efforts hobbled by shortage of cyber experts
New study finds that the U.S. government’s ability to cope with the growing wave of cyber attacks on government networks is hampered by shortage of cybersecurity experts
-
-
U.S. considers cloud security standards
Cloud computing is gaining among businesses, so the U.S. government says it may step up with a set of cloud-security standards to meet government requirements for protecting sensitive data
-
-
This product description will self-destruct
Huskies researchers develop a tool to make online personal data vanish; after a set time period, electronic communications such as e-mail, Facebook posts, and chat messages would automatically self-destruct, becoming irretrievable from all Web sites, inboxes, outboxes, backup sites, and home computers
-
-
Widespread privacy failings in online social networks
A Cambridge University study finds serious privacy weaknesses in the way social networking sites are run; those who join such site are often unaware of these weaknesses
-
-
Junk mailers exploit swine flu
Junk mailers send unsuspected users a Word document posing as a CDC update on the global spread of swine flu; if users open the document, they release a malicious code
-
-
DARPA awards Cobham $15 million for wireless network
DARPA awards Cobham a contract calling for the company to develop low-cost wireless network nodes which support adaptation by means of distributed network processing
-
-
Google, Microsoft promise new age in cyber-security
Security-conscious consumers are in the habit of regularly updating their antivirus software; this will soon be unnecessary — this, at least, is the promise of both Microsoft and Google; the two companies’ new operating systems will include built-in, continuously updated defenses against viruses and malware
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.