-
U.K. government grants itself even more data sharing power
A U.K. government proposal debated in Parliament this week would increase the ability of different government arms to share data
-
-
Here they go again: China demands access to Western computer security
Another crisis in U.S.-China trade relations looms, as China, again, is about to introduce rules which would allow Chinese companies to steal Western industrial secrets, and would allow the Chinese government more tightly to monitor what the Chinese people say and read
-
-
DSL routers vulnerable to malware attacks
New reports says DSL modems are susceptible to attacks more typically associated with Web sites: Hackers can insert malware onto the victim’s computer or recruit the computer as a bot for a botnet
-
-
Day of 4G technology -- mobile WiMax -- nears
Clearwire and Sprint Nextel completes transaction to combine their next-generation wireless Internet businesses; companies announce $3.2 billion investment to launch 4G mobile Internet company
-
-
European states to coordinate anti-cybercrime effort
The 27 member states of the EU are worried about the effects of cyber crimes on the European economy; new blueprint for fighting cybercrime calls for better cooperation among national law enforcement units
-
-
Russian hackers attacked U.S. Central Command's networks
Russian hackers have been the prime suspects in sustained attacks on government networks and Web sites in Estonia and Georgia; now evidence emerges to implicate Russian hackers in sustained attacks on the computer system of the U.S. Central Command, which oversees the wars in Iraq and Afghanistan
-
-
Making cloud computing safer
As the cost and other benefits of cloud computing become apparent, more and more companies move parts of their infrastructure out of their data centers; there is a need, though, to think long and hard about disaster-proofing the cloud
-
-
Briefly noted
IT to get more attention in approval process for political appointees… More U.S. hospitals turn to palm biometircs for patient identification
-
-
New CFIUS regulations
CFIUS issues final regulations governing national security reviews of foreign investment in the United States
-
-
Queen's University nets £25 million funds for cybersecurity research
Belfast’s Queen University receives funding to open the new Center for Secure Information Technologies (CSIT) which will do research in areas including data encryption, network security, wireless security, and “intelligent surveillance technology”
-
-
Panel calls on Obama to appoint a cybersecurity czar
CSIS panel urges the incoming president to elevate handling of cyber security issues to the White House and not leave them with DHS, which is the current leader on these issues
-
-
Encryption breakthrough: new way to generate random numbers
Encryption depends on random numbers, but generating random numbers is not easy; existing devices, which can typically only produce 10s or 100s of megabits of random numbers per second; researchers show new method that can generate truly random sequences at up to 1.7 gigabits per second
-
-
Experts: Internet crime might cause global catastrophe
Damage caused by cyber crime is estimated at $100 billion annually; tech-savvy gangs from China, India, Eastern Europe, and Africa were coming up with ever more sophisticated ways of swindling money from vulnerable people
-
-
Searching for new Internet security standard
Cryptographers compete to define a new Internet security standard; this is necessary because the current standard — the Secure Hash Algorithm 2 (SHA-2) — is starting to show its age
-
-
Security alliance calls financial incentives for cyber security
The Internet Security Alliance calls for the incoming Obama administration and Congress to give information technology companies financial incentives for improving cybersecurity defenses, including providing funding in research and development and shielding them from liability caused by cyberattacks
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.