-
Taliban continue campaign against cellular service in Waziristan
Taliban and al-Qaeda militants believe that the CIA and U.S. military rely on cellular communication intercepts to track and kill members of the two organizations; Taliban leaders warned Pakistan not to expand the cellular network in the areas under Taliban control; those networks already in place must be shut down overnight
-
-
Video on beyond line-of-sight high-bandwidth connection possible
Boeing demonstrates that transmitting video on beyond line-of-sight high-bandwidth connection is possible
-
-
Political denial-of-service attacks on the rise
The cases of Estonia in 2007 and Georgia in 2008 illustrate how dedicated denial-of-service attacks can nearly paralyze a country; trouble is, now attackers can purchase tools such as Black Energy or NetBot Attacker, made by Russian and Chinese hackers, respectively, for less than $100 a piece
-
-
Experts: Russian intelligence behind cyber attacks
A panel of IT security experts concluded that there is a “strong likelihood” that the Foreign Military Intelligence agency (the GRU) and Federal Security Service (the FSB) directed cyber attacks on Georgian government servers in July and August of 2008
-
-
Large defense contractors look for cyber-security business
Cyber attacks on U.S. government networks and private companies have grown exponentially; the result is a vast increase in the attention paid to, and money spent on, cyber security; the biggest U.S. military contractors are counting on winning billions of dollars in work to protect the U.S. federal government against cyber attacks
-
-
Critic: U.K. fraud strategy "more worthy of Uzbekistan"
Business fraud costs Britain £14 billion a year; the U.K. government today launched its National Fraud Strategy, but a Cambridge professor harshly criticizes the initiative
-
-
Leading browsers easily felled at hacker contest
Students at a hacker convention easily breach the protections built into Safari, IE 8, and Firefox; contestants do so in front of appreciative spectators and in a matter of hours
-
-
CSC to help combat cyber warfare
Cyberattacks pose a major threat to the welfare and security of developing countries; developing protection against that threat offers business opportunities
-
-
Cyber criminals already using March Madness for their scams
March Madness begins at the end of this week, but cyber criminals are already exploiting the popular college basketball event for their nefarious purposes
-
-
Yoran: Better metrics needed for security
Amit Yoran says that the security industry is awash in bad data, and that companies that attempt to use the metrics could take the wrong actions
-
-
UNC students win cyber defense competition
University of North Carolina students win, for the second time in four years, the DHS-sponsored Southeastern Region Collegiate Cyber Defense Competition
-
-
New York City is especially vulnerable to rise in sea level
Although low-lying Florida and Western Europe are often considered the most vulnerable to sea level changes, the northeast U.S. coast is particularly vulnerable because the Atlantic meridional overturning circulation (AMOC) is susceptible to global warming
-
-
2007 cyber attack on Estonia launched by Kremlin-backed youth group
Sustained cyber attacks in April and May 2007 on Web sites of the Estonian government paralyzed many government functions and commercial activities; it was the first such sustained attack on a country’s networks
-
-
Critics: Commercially driven deep packet inspection (DPI) is akin to wiretapping
New technology now allows third parties to engage in deep packet inspection (DPI), a technique that makes it possible to peer inside packets of data transmitted across the Internet; data collected is then sold to other companies to allow them more targeted advertising
-
-
U.S. slow to pinpoint source of cyber attacks
U.S. director of national intelligence tells lawmakers that “It often takes weeks and sometimes months of subsequent investigation [to identify the source of a cyber attack]… And even at the end of very long investigations you’re not quite sure who carried out the offensive”
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.