-
Hackers' attacks on U.S. government systems are frequent, serious
U.S. government computer systems under frequent and serious attacks by other governments and organizations; James Finch, assistant director of the FBI’s cybercrime division: “We’re not worried so much about the noisy attacks as we are about the quiet ones”
-
-
Beckstrom: Networking security worth the money
Rod Beckstrom, director of the U.S. Department of Homeland Security’s National Cybersecurity Center, tells Black Hat that “We want to invest in protocols because it may be some of the cheapest security dollars we can spend”
-
-
Kaminsky offers details of DNS flaw
Dan Kaminsky tells Black Hat attendees about the DNS vulnerability he discovered a few months ago; “We have to get better about fixing the infrastructure,” Kaminsky said; “We got lucky fixing this bug but may not be so lucky next time.”
-
-
New approach to virus protection
Wolverines researchers describe a new method of protecting computers against viruses by moving antivirus functionality into the “network cloud” and off personal computers
-
-
Ensuring uptime at the Games
Technology glitches at previous Olympics have lead to problems such as the inability to feed competition results into official Web sites and media outlets; Chinese security officials must also contend with individuals and groups of hackers attacking systems during the Olympics
-
-
Giant online security hole getting fixed, slowly
Serious DNS security flaw was discovered a month ago, a flaw which allowed criminals silently to redirect traffic to Web sites under their control; more details will be given at today’s Black Hat event
-
-
FEMA's still struggles with IT security issues
DHS’s IG reports that “These issues collectively limit FEMA’s ability to ensure that critical financial and operational data is maintained in a manner to ensure confidentiality, integrity and availability”
-
-
Tuffin Technology's products win F&S award
Security and network operations are becoming increasingly complex. Large enterprises have multiple firewalls spread across different time zones and business units and are also required to comply with stringent regulatory requirements; Tuffin Technology offers management solutions to help businesses cope
-
-
DHS releases national emergency communications plan
Seven years after 9/11, and three years after Katrina, DHS releases the U.S. first strategic plan aimed at improving emergency response communications
-
-
Security flaws in online banking sites widespread
Researchers find widespread security flaws in online banking Web sites; these design flaws are not bugs that can be fixed with a patch; rather, they stem from the flow and the layout of these Web sites
-
-
Sharp increase in "zero-day" exploits
Cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before
-
-
Harris shows new multiband software-defined radio
New Unity XG-100 provides direct interoperability to federal, state, and local public safety agencies across multiple frequency bands
-
-
Project to rebuild Internet gets $12M, bandwidth
A massive project to redesign and rebuild the Internet from scratch is inching along with $12 million in government funding and donations of network capacity by two major research organizations
-
-
Day of optical communications nears
New technique to compress light could open doors for optical communications; scientists at the University of California-Berkeley have devised a way to squeeze light into tighter spaces than ever thought possible, opening doors to new technology in the fields of optical communications, miniature lasers, and optical computers
-
-
Breakthrough: First commercial quantum cryptography chip
The future of (at least theoretically) completely secure communication nears as Siemens and two European research centers claim to have developed the first quantum cryptography chip for commercial use
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.