-
US-CERT warns of swine flu-related phishing scams
The swine flu outbreak is about two weeks old, but criminals are already e-mailing millions of phishing e-mails which purport to offer the latest information about the disease
-
-
NIST in new password management policy
NIST offers, and opens for public comment, new password policy for government and private organizations
-
-
U.K. government drops central database scheme
Burden of storing communication logs will now fall to ISPs
-
-
A lost or stolen laptop costs companies nearly $50,000
A company may pay $1,000-$2,000 for a laptop computer for one of its employees; if the employee lost the laptop or it was stolen, the cost to the employer would average $49,246
-
-
U.K. considering joining EU cyberwar effort
U.K. government says it is considering taking part in the EU equivalent of the U.S. Cyber Storm drill, but is worried not all EU members are ready
-
-
Hathaway: cybersecurity must be joint effort
President Obama’s top cybersecurity adviser: The fragility of the world’s digital infrastructure is “one of the most serious economic and national security challenges of the 21st century”
-
-
F-35 project hacking case highlights need for tighter contractor security
Hackers managed to download terabytes of information about one of the Pentagon’s most prized weapons systems; experts say this latest breach highlights the need for stricter security requirements for contractor networks
-
-
Hackers steal several terabytes of data on U.S. fighter-jet project
Hackers — in all likelihood Chinese operatives — breach Pentagon’s security and download several terabytes of data on the $300-billion Joint Strike Fighter project (the F-35 Lightning II) which may make it easier to defend against the futuristic aircraft
-
-
U.S. looks to hackers to protect cyber networks
DHS is looking for hackers — not to prosecute them, but to pay them to secure the nation’s networks
-
-
South Africa: Intelleca awarded voice biometrics contract
South African leading network operator awards Intelleca large voice recognition contract; the operator plans to implement the solution across a range of business areas in its contact center
-
-
Counterintelligence expert not worried about Chinese hacking
Joel Brenner, national counterintelligence executive, says is less worried about Chinese hacking of U.S. banking system and somewhat more worried about such hacking of U.S. critical infrastructure;
-
-
Harris Corporation acquires Wireless Systems for $675 million in cash
The global land mobile radio (LMR) systems market is values at $9 billion a year and growing; Harris Corporation wants a bigger presence in this emergency and public safety communication market; it is set to acquire Tyco Electronics Wireless Systems, creating a leading provider of wireless communication networks in the LMR systems market
-
-
The security of the U.S. communications network, II
A few vandals, equipped with pliers, last Thursday cut fiber-optics cables in the San Francisco Bay area, paralyzing wireless, Internet, phone, and emergency communication for more than twelve hours; what does this tell us about the vulnerability to disruption of the .S. communication network?
-
-
NIST offers five encryption tips
There are many encryption algorithms, techniques, and products — and many user devices and threats against them; NIST offers five encryption tips
-
-
The security of the U.S. communications network, I
A few vandals, equipped with pliers, last Thursday cut fiber-optics cables in the San Francisco Bay area, paralyzing wireless, Internet, phone, and emergency communication for more than twelve hours; what does this tell us about the vulnerability to disruption of the U.S. communication network?
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.