-
U.S. cybersecurity law to give feds unprecedented Internet control
Lawmakers draft legislation giving the U.S. government unprecedented authority over the U.S. critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies; the legislation is intended to protect a broad range of the U.S. infrastructure — including networks for the country’s banking industry, utilities, transportation, and telecommunications — from cyber attacks
-
-
U.S. legislators supports creation of cybersecurity czar
Vowing to prevent Cyber Katrina, U.S. senators propose cyber czar
-
-
Dubious distinction: U.S. produces most cybercriminals -- and victims
Cybercriminals defrauded victims out of an estimated $265 million, with the average victim losing about $1,000; two out of three cybercriminals — and 93 percent of victims — were Americans
-
-
New DHS security tool to detect Conficker worm
Conficker had been programmed to reach out to 250 Web sites daily to download commands from its masters — but tomorrow it will begin connecting with 50,000 Web sites daily for instructions
-
-
Chemical company wants to limit disclosure on plant explosion
An explosion in a chemical plant in West Virginia plant killed two employees and raised fears about the safety of chemical plants located near residential areas; the plant owner, citing a terrorism-related federal law, is trying to limit what the federal chemical safety agency can disclose to the public
-
-
The notion that cybercrime exceeds drug trade is a myth
The number of $1 trillion — as in “cybercrime now generates $1 trillion a year for cybercriminals” — appears to be a myth, even it if is repeated by IT security and communication companies
-
-
Denmark, Sweden ahead of U.S. in new global IT report
Denmark and Sweden are better than the United States in their ability to exploit information and communications technology; this good news for the United States: it climbed one spot from No. 4 in 2007 to No. 3, and the report says the United States was well placed for a technology-driven recovery as it has the top scientific research institutions in the world and best collaboration between universities and industries
-
-
Taliban continue campaign against cellular service in Waziristan
Taliban and al-Qaeda militants believe that the CIA and U.S. military rely on cellular communication intercepts to track and kill members of the two organizations; Taliban leaders warned Pakistan not to expand the cellular network in the areas under Taliban control; those networks already in place must be shut down overnight
-
-
Video on beyond line-of-sight high-bandwidth connection possible
Boeing demonstrates that transmitting video on beyond line-of-sight high-bandwidth connection is possible
-
-
Political denial-of-service attacks on the rise
The cases of Estonia in 2007 and Georgia in 2008 illustrate how dedicated denial-of-service attacks can nearly paralyze a country; trouble is, now attackers can purchase tools such as Black Energy or NetBot Attacker, made by Russian and Chinese hackers, respectively, for less than $100 a piece
-
-
Experts: Russian intelligence behind cyber attacks
A panel of IT security experts concluded that there is a “strong likelihood” that the Foreign Military Intelligence agency (the GRU) and Federal Security Service (the FSB) directed cyber attacks on Georgian government servers in July and August of 2008
-
-
Large defense contractors look for cyber-security business
Cyber attacks on U.S. government networks and private companies have grown exponentially; the result is a vast increase in the attention paid to, and money spent on, cyber security; the biggest U.S. military contractors are counting on winning billions of dollars in work to protect the U.S. federal government against cyber attacks
-
-
Critic: U.K. fraud strategy "more worthy of Uzbekistan"
Business fraud costs Britain £14 billion a year; the U.K. government today launched its National Fraud Strategy, but a Cambridge professor harshly criticizes the initiative
-
-
Leading browsers easily felled at hacker contest
Students at a hacker convention easily breach the protections built into Safari, IE 8, and Firefox; contestants do so in front of appreciative spectators and in a matter of hours
-
-
CSC to help combat cyber warfare
Cyberattacks pose a major threat to the welfare and security of developing countries; developing protection against that threat offers business opportunities
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.