-
U.S. secret service forms three new task forces
New task forces will deal with electronic crimes, and the agency says the partnerships will bring together law enforcement, academia, and private sector
-
-
Cyber crime bigwigs using big-business tactics
Cisco cybercrime reports says “The novel thing is that [cybercriminals] have taken the Harvard Business School, General Electric board room business training and applied it to their old techniques”
-
-
SAIC acquires Atlan
Large federal contractor acquires McLean, Virginia-based Atlan, a specialist in cybersecurity product testing and certification of FIPS 140-2 and 201 for product vendors
-
-
Competition between Symantec, McAfee intensifies
With growing consumer awareness of cybersecurity threats, the competition between the two leading cybersecurity companies intensifies; McAfee has been lagging, but new leadership and willingness to take risks have improved its market position
-
-
Practical guides to disaster recovery planning in SMEs
Gartner says that “40% of all SMBs will go out of business if they cannot get to their data in the first 24 hours after a crisis”; two papers aim to help SMBs prepare for disaster
-
-
South Korea says cyber attackers used IP address in 16 nations
South Korea’s intelligence agency — the NIS — said that the 4-8 July attacks on U.S. and South Korean Web sites and networks used 86 IP addresses in 16 countries; the NIS also briefed South Koran lawmakers on circumstantial and technical reasons for believing that North Korea could be behind the attacks
-
-
Experts differ on seriousness, and source, of attacks on U.S. Web sites
Between Monday and Wednesday, public and private computers in the U.S.— among them the White House, the New York Stock Exchange, and the Washington Post — were targeted for a broad and sustained attack; some of these computers were taken down for a while; experts disagree on the seriousness of the attack — or its source
-
-
Number of U.K. data breach incidents on the rise
Security breaches in the U.K.— in both the private and public sectors — are on the rise; one third of firms unaffected by data loss incident had introduced an enterprise-wide encryption policy
-
-
DHS's Einstein 3 plans raise questions
DHS wants to use Einstein 3 to bolster cybersecurity; the deployment of this powerful program has its critics, though
-
-
Administration's cybersecurity spending would benefit commercial vendors
The United States expects to spend about $7.3 billion on cybersecurity in fiscal 2009; which firms would benefit from government spending increases? It is likely the commercial software vendors
-
-
European researchers create largest quantum key distribution network
Researchers from several European institutions unite in creating the largest quantum key distribution network ever built; a big step toward practical implementation of quantum encryption
-
-
U.S. official says administration is serious about cybersecurity
President Obama, on 29 May, outlined his administration’s cybersecurity strategy; skeptics said they heard such plans promoted before — but administration officials say this time they are serious
-
-
U.S. legislators want European companies punished for aiding Iran's regime
Republican Lindsey Graham (South Carolina) and Democratic Charles Schumer (New York) are backing legislation which calls for the U.S. government “to identify foreign companies that export sensitive technology to Iran. Those companies would not be allowed to apply for procurement contracts with the U.S. government, or renew expiring ones, unless they first terminated those exports to Iran”
-
-
U.S., Russia disagree on cybersecurity
Washington does not believe an international treaty is necessary, but Moscow is seeking a treaty resembling those negotiated on chemical warfare to address the threat of Internet hacker attacks on computer systems
-
-
U.K. infrastructure vulnerable to terrorism, bad weather
A comprehensive new study of U.K. infrastructure says not enough was being done to ensure systems such as energy and transportation could keep going in adverse circumstances
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.