• GPS vulnerable to spoofing

    GPS technology is ubiquitous in civilian and military applications; Cornell University researchers raise uncomfortable questions by demonstrating how GPS navigation devices can be readliy duped by transmission of fake GPS signals that receivers accept as authentic ones

  • Cyber Storm II drill shows ferocity of virtual attack

    In March governments from Australia, the United Kingdom, New Zealand, Canada, and the United States ran the largest-ever cyber war games, Cyber Storm II; the drill tested critical infrastructure including dam walls, telecommunications, and government computer networks

  • NATO in major anti-terror drill

    NATO will hold a two-week comprehensive anti-terrorrism drill in Sardinia; 15 nations, 10 agencies will coordinate land, air, sea, space assets in an effort to smooth communication, information sharing, and operational execution

  • Briefly noted

    Aussie cyber security needs work… D.C. policy carry iPhones… Surveillance radar in Indonesian straits… HUD awards Iowa critical infrastructure funds…

  • "Thought helmets" for silent, secure communication among soldiers

    U.S. Army funds research into helmets with embedded sensors which “read” a soldier’s thoughts (well, brain waves) and transmit them, telepathy-like, to their intended target

  • Keep IT security simple

    New study of corporate security breaches says that 87 percent of all security breaches could have been avoided “if reasonable security controls had been in place at the time of the incident”

  • Briefly noted

    Debating whether DHS should have cybersecurity responsibilities… FDA revisits refused foods issue… DoD tests contractors’ ID cards

  • USPS to deploy IPv6-capable video surveillance

    The U.S. Postal Services wants to increase security inside the more than 40,000 post offices around the country; it will install IPv6-capable CCTV systems — complying with the federal government encouragment of agnecies to migrate to IPv6

  • U.K. start-up develops file-sharing monitoring tool

    Businesses can face serious consequences from illegal file sharing which takes place on their network, whether the files contain confidential client data or copyrighted material; new tool helps companies monitor file sharing

  • GAO: U.S. computer emergency readiness team is not ready

    Government Accounting Office criticizes US-CERT for lacking “a comprehensive baseline understanding of the nation’s critical information infrastructure operations” and for not exhibiting “aspects of the attributes essential to having a truly national capability,” among other things

  • IBM shows hardware-based encryption tool

    System x Vault protects data when a server’s hard drive is disposed or stolen, without affecting server performance

  • Forrester boosts 2008 tech spending forecast

    For the technology sector, it may be a case of good news now and so-so news later; one wild card for the tech sector is the poor health of the nation’s banks and other financial-services companies, which account for about 18 percent of the U.S. technology market

  • CTO defends researcher's decision to reveal SCADA exploit

    Supervisory Control and Data Acquisition (SCADA) software controls critical U.S. infrastructure; in June, a researcher released attack code which takes advantage of a stack-based buffer overflow bug in SCADA software; security patches have been provided, but the community debates whether the researcher acted responsibly

  • Botnets, not the Russian government, behind Georgian attacks

    Scrutiny of botnet activity indicates Russia’s attacks on Georgia were not state-sponsored

  • Analyst group: Some companies cutting IT spending

    Many large companies, especially those in the financial services, utilities, and telecommunications industries, have cut their technology budgets this year because of the economic slowdown