-
Hackers made off with more than 285 million records in 2008
Hackers managed to steal 285 million private records in 2008; 93 percent of all compromised records in its study came from the financial sector
-
-
Coverity centralizes code defect checkers
Coverity’s new Integrity Center was created while the company was analyzing 250 open source code projects on a DHS contract
-
-
Global network security market to reach $9.5 billion by 2015
The global network security market continues to witness increasing growth driven by expansion of enterprise networks, growing security threats, increasing adoption of advanced products, and expansion of lesser-developed markets; spurred by favorable trends, the network security market is expected to reach $9.5 billion by 2015
-
-
AT&T increases reward in cable vandalism to $250,000
Late last eek vandals cut fiber optic cables in three California counties, disrupting communication and commerce; AT&T increases reward for information which will lead to capturing the vandals
-
-
Combating a silent attacker: Using information assurance to protect federal agencies // by Stan Tyliszczak
To defeat the next generation of cyber threats, government agencies will need to not only deploy the latest cyber security tools, but also cultivate and maintain an information security-savvy workforce through concerted, longstanding training initiatives
-
-
Germany is target of sustained cyberattacks from China
The German government is constantly the target of hackers seeking to insert spy programs into its computer systems; the attacks are becoming more and more sophisticated
-
-
Technology companies to enjoy stimulus package funds
The emphasis of the Obama administration on directing a large portion of the stimulus package toward improving the U.S. infrastructure means the technology companies with the right solutons stand to benefit
-
-
White House to coordinate cybersecurity efforts
White House to coordinate securing networks government-wide, identifying more than 250 requirements in an on-going 60-day review of federal cybersecurity initiatives
-
-
Cobham acquires Argotek for $36.25 million
U.K. global defense group Cobham, eager to exploit the growing business opportunities in IT security, acquires U.S. IT security specialist Argotek; acquisition requires approval by CFIUS
-
-
Canada focused on new cybersecurity strategy
Ottawa is developing a new cybersecurity strategy in light of repeated incursions into the country’s key computer networks
-
-
Aussie government in $43 billion fast Internet scheme
The economic slowdown found private Australian telecommunication companies unwilling to fund a high-speed national broadband network, a network which Kevin Rudd’s government believes is essential for the country’s economic competitiveness; the government is stepping in, saying it would invest at least $21.9 billion of taxpayers’ money to get the project going
-
-
Fighting cyber attacks costs Pentagon $100 million
The U.S. Department of Defense and military are subject to constant cyber attacks against their networks; the cost of repairing the damage of such attacks — manpower, computer technology, and contractors hired to clean up after both external probes and internal mistakes — is $100 million a year
-
-
Hackers of U.S. electrical grid left behind "sleeper" software programs
The U.S. electrical grid has been penetrated by sophisticated hackers who left behind “sleeper” software programs which could be remotely activated to disrupt the system; the intelligence community says it is the work of Russian and Chinese government operatives
-
-
U.K. Home Office terrorism advisory site offered link to a porno site
On Monday, a new EU regulation went into effect mandating that ISPs store details of user e-mails and Internet calls; a Home Office site contained a link for citizens who felt the measure was too intrusive, and who would want to send the Home Office a complaint about it; trouble is, those who clicked on the link were sent to a Japanese porno site
-
-
Aussie company targets CCTV market for its encryption technology
Melbourne-based network encryption company Senetas Corporation, a leading developer of encryption products, said the growing CCTV market, still in its infancy as far as security is concerned, offers its encryption solutions an attractive opportunity
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.