-
China deploys secure computer operating system
China has installed a secure operating system known as “Kylin” on government and military computers designed to be impenetrable to U.S. military and intelligence agencies
-
-
NERC approves strengthened cyber security standards
The North American Electric Reliability Corp.’s (NERC) independent Board of Trustees last week approved eight revised cyber security standards; entities found in violation of the standards can be fined up to $1 million per day, per violation in the United States
-
-
Cyber security experts unveil spammer strategies
Computer security experts infiltrated a botnet called Storm and analyzed the way its complex internal communications worked; knowledge gained will help in writing anti-spam software
-
-
Hackers break into UC Berkeley health-services databases
Hackers began breaking into the databases back in October, and continued to steal information until breach was discovered on 9 April; about 160,000 individuals believed to be affected by breach
-
-
NIST's high-rise fire study highlights deadly wind-driven fires
Fire researchers at NIST have published two reports providing details of how wind affects fires in high-rise buildings
-
-
Virginia medical records hijacking -- update
A hacker claimed to have broken into the Web site of the Virginia Department of Health Professions, encrypted more than 8 million patient records and 35 million prescriptions in the database, and then deleted the original data; the hacker sought a $10 million ransom for the password to decrypt the data; Virginia health agency says all of its files have been backed up and secured
-
-
U.S. air traffic vulnerable to "serious harm" from cyber attacks
New FAA report: “{U}nless effective action is taken quickly, it is likely to be a matter of when, not if, ATC [air traffic control] systems encounter attacks that do serious harm to ATC operations”
-
-
Hackers hold medical records hostage
Hackers broke into a Virgina pharmaceutical clearinghouse Web site, deleted records of more than 8 million patients, and replaced the site’s homepage with a ransom note demanding $10 million for the return of the records
-
-
NSA boss: U.S. needs unified cyber-command center
Head of the secretive NSA tells Congress that the cyber-threats the United States faces require a centralized digital command center which will operate under the U.S. Strategic Command
-
-
China rising: the increasing threat of Chinese cyber-warfare
The only way to stop the proliferating cyber-attacks against the United States and Western powers is to raise the political and economic cost to China in order to make it in the interests of the government of China to stop such attacks
-
-
Industry group urges creation of cyber czar post
Intelligence and National Security Alliance (INSA), a coalition of defense, intelligence, and IT security companies, urges President Obama to create a cyber czar post with cabinet rank
-
-
U.K. moves forward with comprehensive eavesdropping scheme
The U.K. government announced last week that it was abandoning the plan to create a centralized super-database in which the personal information of Britons will be kept — but a £1 billion intelligence gathering project is moving forward; the scheme will monitor all all e-mails, Web site visits, and social networking sessions in Britain
-
-
Making quantum cryptography's promise a reality
New research details how quantum communication can be made possible without having to use cryogenic cooling or complicated optical setups, making it much more likely to become commercially viable soon
-
-
KTN launches global information systems initiative
Cyber Security Knowledge Transfer Network unveils roadmap to help achieve a global security network that will ensure that software and systems have security and privacy defined at project initiation and “implemented as a matter of course”
-
-
Experts: U.S. military's cyberwar rules "ill-formed"
Experts panel criticizes U.S. plans for cyberwarfare as “ill-formed,” “undeveloped,” and “highly uncertain”; as a result, many nuances of cyberwar have remained poorly understood, even as the military actively prepares for it
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.