-
FCC releases report on agency's preparedness for major emergencies
The FCC has an important role to play in ensuring that the U.S. communications infrastructure serves the public safety needs; a new report concludes that the agency largely meets this challenge, but that there are a few area where matter can be improved
-
-
New data protection approach
New data security system developed by Israeli researchers automatically protects sensitive data because it travels with the data even when it is saved to removable devices like a USB flash drive
-
-
Einstein 3 raises privacy concerns
New cyber security system — Einstein 3 — will be rolled out across all U.S. government agencies; in addition to detecting malicious software, the system can read e-mails and other Internet traffic
-
-
Code-breaking quantum algorithm runs on a silicon chip
fifteen years ago, Peter Shor, a computer scientist at MIT, predicted that quantum computers could beat even the most powerful supercomputers and crack the widely used RSA encryption algorithm; he was right: University of Bristol researchers built a silicon chip that can do just that
-
-
Trojan horse virus allows hackers, law enforcement, to eavesdrops on VoIP
A Trojan horse virus allows hackers, but also law enforcement, to record VoIP calls; law enforcement in the U.S. would presumably need a court order to surveil someone’s Skype calls, but the barriers to deploying the virus might be lower for intelligence agencies and authorities in other countries
-
-
U.S. has a flawed approach to cyber security
Critics call on courts to recognize that obsolete computer systems are a major cause of security breaches; “As the courts probe (the) causative issues, it will become increasingly clear that computer systems’ failure to embed automated alerts is the root problem”
-
-
DHS' Cyber Storm III to test U.S. national cyber response plan
One objective of Cyber Storm III is to harmonize the various alert level systems used in government and the private sector so that all stakeholders at least speak the same language
-
-
President to be able to seize private-sector networks in an emergency
A bill being drafted in Congress (the is a revised bill — the original went further) permits the president to seize temporary control of private-sector networks during a cybersecurity emergency
-
-
DHS, industry release plan for evaluating IT risk
The recommendations provide tech developers and managers with a model for identifying and mitigating risk in IT solutions that serve companies in the critical infrastructure sector and other markets
-
-
U.K. banks lax on Internet fraud
U.K. Payments Administration (formerly APACS) reports that online banking fraud reached £52.5 million in 2008, more than doubling from the £22.6 million recorded in 2007; not all banks take measures which are adequate
-
-
Cybercriminals learn how to increase the longevity of malware
Cybercriminals have stopped producing as much new malware to maintain their criminal activity, opting for a cheaper approach: registering new domains and spreading the malware across as many different Web sites and domains as possible
-
-
Precipitous -- and inexplicable -- drop in phishing e-mails
A new report from IBM shows a big drop in the volume of “phishing” e-mails, in which fraud artists send what looks like a legitimate message from a bank or some other company
-
-
Russia's cyber warfare strategies, II
The August 2008 Georgia cyber campaign showed that Russia’s offensive information operations have improved considerably since the April-May 2007 conflict with Estonia
-
-
Cloud computing, social network to help software security
The difference between Immunet’s offering and other companies’ products, say its founders, is the software’s ability to protect digital communities — those users connected together via social networks such as instant messaging, Facebook, or Twitter
-
-
Fake DHS e-mail used to spread malware
DHS warns that some e-mails purporting to be from the department’s intelligence division were fake and contained malicious software
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.