-
Anti-U.S. hackers break into U.S. Army servers
InformationWeek reports that Defense Department investigators subpoena records from Google, Microsoft, and Yahoo in connection with ongoing probe of Turkish hackers who broke into U.S. Army servers
-
-
Obama to call for better security for computers
President Barack Obama today will outline his administration’s plans to bolster U.S. cybersecurity; the president will announce the creation of a cyber czar position
-
-
EU to rely on advanced network technology to bolster resilience
EU security agency recommends greater use of advanced networking technologies such as IPv6, DNSSec, and MPLS to strengthen the resilience of communication networks
-
-
ABI Research: DHS a "potential goldmine" for wireless kit providers
Obama’s stimulus package earmarks $6.8 billion for wireless communications upgrades and new deployments; the health care and education market will receive some of it, but the real money is in selling wireless equipment to DHS and U.S. Customs and Border Protection (CBP), a new ABI Research report says
-
-
Aussie government to make Great Australian Firewall optional
The Australian government proposed to create a firewall which would protect Australians from disagreeable Web contents such as child pornography; when the proposed blacklists were leaked, however, they were shown to include content like poker sites, Wikipedia pages, religious sites, ordinary pornography, and business sites
-
-
U.S. will create cybersecurity czar
President Obama is set to name a cyber security czar; announcement to be timed with the release of the administration’s much-anticipated cybersecurity review; the czar would have two bosses — the national security adviser and the White House economic adviser — in order to strike a balance between homeland security and economic concerns
-
-
Cobham acquires Argotek
The trend of large defense contractors acquiring smaller companies specializing in IT security continues; the latest: U.K.-based Cobham buy U.S. specialist Argotek; Cobham says Argotek’s expertise will be in demand for upcoming projects such as the U.S. Comprehensive National Cyber Initiative
-
-
U.S. military developing simple-to-use cyber attack devices
Most soldiers are not IT specialists, so DARPA is looking to develop simple-to-use cyber warfare gadgets which would allow nonspecialists to penetrate satellites, VoIP networks, and supervisory control and data acquisition systems (SCADA)
-
-
Wanted: high school hackers, crackers, and other digital deviants
The Pentagon is looking for a few good high-school hackers; in an effort to counter sustained Chinese and Russian hacking of U.S. government and industry networks, the Pentagon is launching a new military-funded program aimed at leveraging an untapped resource: the U.S. population of geeky high school and college students
-
-
SCADA more vulnerable than ever
Modern SCADA networks are more vulnerable than ever because they use open networking standards (such as TCP/IP), are now deployed under less secure operating systems (Windows), are connected to other networks (including Internet), and cannot be easily updated and rebooted
-
-
GAO: U.S. government agencies weak on cybersecurity
GAO reports says that 23 out of 24 major U.S. government agencies have weak cybersecurity programs, potentially placing sensitive data at risk to exposure
-
-
Mobile WiMax to be rolled out in Atlanta in June
Clearwire says it will roll out mobile WiMax in Atlanta next month, with other cities to follow
-
-
Tech giants buying tech security companies
Tech security appears to be recession-resistant industry; tech giants position themselves to benefit from the greater emphasis on IT security in the U.S. 2010 budget by buying smaller cybersecurity companies; the prices are attractive: VCs who, a few years ago, invested in promising security start-ups can no longer count on cashing in by going public
-
-
IT spending to increase on Obama's watch
New OMB report says that IT spending will increase by 7 percent in fiscal 2010 — to $75.8 billion
-
-
China deploys secure computer operating system
China has installed a secure operating system known as “Kylin” on government and military computers designed to be impenetrable to U.S. military and intelligence agencies
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.