-
EAGLE task order opportunities
With the federal fourth quarter underway, vendors are wondering where end-of-year spending will happen; task order vehicles are an obvious place to look because task orders can be competed and awarded quickly; DHS’s EAGLE task order is one example
-
-
New immunization strategy better in handling epidemics, computer viruses
New immunization approach fragments the population to be immunized into many connected clusters of equal size; by creating equal-size clusters, doses do not have to be “wasted” on isolating very small clusters, as in the traditional targeted strategy
-
-
Legal skirmish over Defcon talk shows divide on disclosing security flaws
Gag order slapped on MIT students who prepared a talk about Boston transit authority security flaw reignites debate over what “responsible disclosure” of security flaw means
-
-
Indian SMBs will spend $289 million on security related investments this year
Business in India are becoming more aware of security threats and the need for continuity planning; the top three key trends among India SMBs are UTM (Unified Threat Management), BCS (Business Continuity Solutions), and MSS (Managed Security Services)
-
-
GSA implements IPv6
GSA becomes the first civilian agency to implement IPv6; the current IPv4 uses 32-bit addresses, meaning it can offer about 4.3 billion addresses total; IPv6 uses 128-bit addresses, so it can offer an almost unlimited number of addresses — the first step toward achieving fully networked functionality among all electronic devices
-
-
Pentagon suspends USAF cyber effort
The growing dependence of governments and militaries on the Internet has led the U.S. Air Force to create a new Cyber Command; the Air Force has now put this effort on hold
-
-
Who is behind cyber attacks on Georgia?
Sustained cyber attacks of Georgian official Web sites, attacks which immediately preceded and then accompanied the Russian military action against the former Soviet republic, originated from a “hacker militia” of Russian botnet herders and volunteers
-
-
Five steps to safer virtual servers
At the Black Hat conference, HP chief security strategist provided virtualization security advice
-
-
DOJ cybercrime task force shows results
Two years ago the U.S. Department of Justice created Identity Theft Task Force, and has supported its work through vigorous prosecution of the various forms of identity theft
-
-
Russia-Georgia conflict shows new frontier in war
Internet attacks on Georgia highlight a key flaw for more than 100 nations: most of these nations’ external connections go through other countries, and there is a lack of internal connections called Internet exchange points
-
-
Hackers hacked at DefCon gathering
The tens of thousands of networks handling traffic on the Internet are programmed to trust each other for the best routes for data; a bad idea — since a hacker can hijack traffic to and from Web sites of choice by adding enough numbers to computer addresses to have his or her network automatically deemed the best path for the data
-
-
AuthenTec offer scanners for fingerptint-enabled phones
AuthenTec has shipped more than seven million AuthenTec-enabled phones powered by the Symbian OS, comprising 14 mobile phone models using AuthenTec’s fingerprint sensors
-
-
Social networking sites are target-rich opportunity for hackers
Social neyworking sites — Facebook, MySpace, LinkedIn — are becoming more popular for both users and hackers; the biggest danger from social networking sites is that they embed powerful features that only few subscribers actually use, such as digital image or media files with the ability to download content from third-party Web sites, which expose users to risk
-
-
House's measures strengthen cybersecurity
House passes eight measures intended strengthen cybersecurity, promote greater sharing of unclassified information, and prevent the over-classification of information
-
-
Hacker of U.S. defense computers about to be extradited to U.S.
Seven years ago Gary McKinnon, a U.K. citizen, hacked into 92 computer systems at the U.S. Army, the U.S. Air Force, the Department of Defense, and NASA; he said he was hoping to uncover evidence of UFOs; his string of appeals exhausted, he is to be extradited soon
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.