-
Corporate security chiefs say insiders are greatest threat to data
Survey finds that 80 percent of CSIO are more concerned about employees and contractors than they are about external hackers
-
-
Licensing cybersecurity professionals, I
There is a move in Congress to require the Commerce Department to develop or coordinate and integrate a national licensing, certification, and periodic recertification program for cybersecurity professionals
-
-
Effective cybersecurity requires common language
Experts say that the lack of a common way of defining and speaking about cybersecurity threats, risk, and incidents hampers security efforts
-
-
U.K. government to give up on massive Internet snoop scheme
The Home Office admits that its IMP (Interception Modernization Program) — the cost of which was to be £2 billion over ten years — cannot be realized because the technology does not yet exist
-
-
U.S. cybersecurity chief says there is a lucrative market in malware
Philip Reitinger: “There is an entire community of people who are involved, organized crime is involved” in cybercrime underground market economy
-
-
Cyber attackers strike Johns Hopkins University lab
The Johns Hopkins University Applied Physics Laboratory has been awarded $7.3 million to work on the initial phase of the Obama administration’s cyber security project; the lab has been forced to take down its computers after discovering that hackers broke into the lab’s network
-
-
Web-based news from Iran may contain malware
Many use Twitter to follow the fast-changing news from Iran; security experts warn that criminals may use Twitter to plant malware in your computer
-
-
DHS announces $1.8 billion in federal preparedness grants
Grants to states and localities aim to protect, prevent, respond, and recover from potential calamities this fiscal year
-
-
Hathaway describes administration's cybersecurity response plan
The U.S, infrastructure is being challenged and attacked not by amateurs, but by professional criminals and spies backed with substantial resources; yet, there are no coordinated plans for protecting the critical infrastructure or responding to incidents, either by government or the private sector; the Obama administration plans to change that
-
-
Quantum computing nears with European QAP project
QAP co-coordinator Professor Ian Walmsley: “Quantum computing, when it arrives, could make all current cryptographic technology obsolete”
-
-
China uses stolen software in its new Internet censorship scheme
The Chinese government will impose strict Internet censorship beginning 1 July; the software the Chinese will use for filtering Web sites was stolen from California-based Solid Oak Software; the Chinese piracy was exceedingly clumsy: a file containing a 2004 Solid Oak news bulletin has been accidentally included in the Chinese filtering coding
-
-
Hamas, Hezbollah employ Russian hackers for cyber attacks on Israel
During Israel’s January campaign in the Gaza Strip, Israeli government’s Web site were attacked, and some were paralyzed for hours; Israeli intelligence suspects the attacks were carried out by a criminal organization from the former Soviet Union and paid for by Hamas or Hezbollah
-
-
Locating VoIP callers in emergencies
Callers who use VoIP to call 999 (the U.K. equivalent of the U.S. 911) run the risk of making it difficult, if not impossible, for the police, paramedics, and fire crews to attend emergencies promptly; a system is being developed to locate Internet phones
-
-
U.K. to centralize cybersecurity functions
Following President Obama’s cybersecurty initiative, the U.K. government will move to centralize cyber security functions in Whitehall as part of an on-going major review of U.K. cybersecurity
-
-
Mobile workforce poses cybersecurity risk
The growing mobility of the workforce creates new cyber security threats; Symantec’s Vic Mankotia: “Data in motion is the next big threat to government information security”
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.