-
U.S. military pushes for offensive cyber warfare capabilities
U.S. officials have been reluctant to militarize the electronic medium, but a recently declassified report and electronic attacks on Georgia have set off an intense discussion among senior Pentagon officials about going on the offensive
-
-
Urgent inquiry as more personal data missing in Britain
Another data loss blunder in Britain, as a disc containing the personal details of 5,000 employees of the National Offender Management Service (NOMS), who may include many prison officers, went missing
-
-
New York State gives company 45 days to fix problems
New York State awarded M/A Com a contract for building the infrastructure for the statewide wireless network for first responders; the contract was to be completed by December 2006; state comptroller office, citing the delay and nearly 20 other deficiencies, gives company 45 days to fix problem or see its contract revoked
-
-
New metrics to help measure enterprise security
A non-profit IT security organization is working toward releasing a set of metrics for enterprises to measure the effectiveness of their security controls
-
-
Growth in software market driven by security, identity protection concerns
Information security concerns propel market for software products, according to a new report by Global Industry Analysts
-
-
Spending on IT security to grow
Security makes up 10 percent of overall IT operating budgets in 2008, up from 8 percent in 2007; trend to continue
-
-
Germany tightens data protection laws after scandals
After a wistle-blower revealtions, the German authorities decided o find for themselves how easy it was managed to obtain personal information on consumers; government agents managed, in only a few days, to buy six million items of personal data — for just €850 euros ($1,230); the government decided that tightening of regulations was necessary
-
-
How to create the perfect fake identity
If you have the patience and time, you can use “identity farming” to create the perfect fake identity; IT security maven Bruce Schneier writes that the ever more central role data — and data shadow — are playing in our lives now makes it possible
-
-
Virtualization is important for back up and recovery
Server virtualization, that is, the separation of functionality from the underlying hardware, offers organizations many advantages in preparing for coping with and recovering from disasters, but it is not a panacea
-
-
D.C. tests interoperable public safety system
Interoperability between radio and mobile Internet sought, and new technology — called Radio Over Wireless Broadband, or ROW-B — has the potential to save first responders time in an emergency
-
-
Cyber war fears grow after Georgia Web sites attacked
Analysis of the attacks on official Georgia’s Web sites during and following the 8 August Russian incursion lead experts to suspect that rather than initiated by the Russian government, the attacks were the result of cyber “militias” or “hacktivists”; this is worrisome because it highlights the ability of small bands of hackers, let alone governments, to disrupt communication networks and critical infrastructure
-
-
Data breaches in U.S. already surpass 2007 total
The number of reported data breaches in the United States has already surpassed 2007’s total; more states now require breach reporting; experts also say that the development of SQL injections made breaches much easier
-
-
Bay Area's FasTrak road tolls easy to hack
Toll transponders can be cloned, allowing fraudsters to travel for free while others unwittingly foot the bill; more seriously, criminals could use the FasTrak system to create false alibis by overwriting one’s own ID onto another driver’s device before committing a crime
-
-
New system thwarts Internet eavesdropping
The growth of wireless networks has increased the risk of eavesdropping on Internet communications; Carnegie Mellon researchers develop a low-cost system that can thwart these Man-in-the-Middle (MitM) attacks
-
-
Britain "under constant attack in cyberwar"
The U.K. government warns a cyberwar is being waged against Britain with key computer networks coming under attack every day
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.