-
Fighting cyber attacks costs Pentagon $100 million
The U.S. Department of Defense and military are subject to constant cyber attacks against their networks; the cost of repairing the damage of such attacks — manpower, computer technology, and contractors hired to clean up after both external probes and internal mistakes — is $100 million a year
-
-
Hackers of U.S. electrical grid left behind "sleeper" software programs
The U.S. electrical grid has been penetrated by sophisticated hackers who left behind “sleeper” software programs which could be remotely activated to disrupt the system; the intelligence community says it is the work of Russian and Chinese government operatives
-
-
U.K. Home Office terrorism advisory site offered link to a porno site
On Monday, a new EU regulation went into effect mandating that ISPs store details of user e-mails and Internet calls; a Home Office site contained a link for citizens who felt the measure was too intrusive, and who would want to send the Home Office a complaint about it; trouble is, those who clicked on the link were sent to a Japanese porno site
-
-
Aussie company targets CCTV market for its encryption technology
Melbourne-based network encryption company Senetas Corporation, a leading developer of encryption products, said the growing CCTV market, still in its infancy as far as security is concerned, offers its encryption solutions an attractive opportunity
-
-
U.S. cybersecurity law to give feds unprecedented Internet control
Lawmakers draft legislation giving the U.S. government unprecedented authority over the U.S. critical infrastructure, including the power to shut down or limit traffic on private networks during emergencies; the legislation is intended to protect a broad range of the U.S. infrastructure — including networks for the country’s banking industry, utilities, transportation, and telecommunications — from cyber attacks
-
-
U.S. legislators supports creation of cybersecurity czar
Vowing to prevent Cyber Katrina, U.S. senators propose cyber czar
-
-
Dubious distinction: U.S. produces most cybercriminals -- and victims
Cybercriminals defrauded victims out of an estimated $265 million, with the average victim losing about $1,000; two out of three cybercriminals — and 93 percent of victims — were Americans
-
-
New DHS security tool to detect Conficker worm
Conficker had been programmed to reach out to 250 Web sites daily to download commands from its masters — but tomorrow it will begin connecting with 50,000 Web sites daily for instructions
-
-
Chemical company wants to limit disclosure on plant explosion
An explosion in a chemical plant in West Virginia plant killed two employees and raised fears about the safety of chemical plants located near residential areas; the plant owner, citing a terrorism-related federal law, is trying to limit what the federal chemical safety agency can disclose to the public
-
-
The notion that cybercrime exceeds drug trade is a myth
The number of $1 trillion — as in “cybercrime now generates $1 trillion a year for cybercriminals” — appears to be a myth, even it if is repeated by IT security and communication companies
-
-
Denmark, Sweden ahead of U.S. in new global IT report
Denmark and Sweden are better than the United States in their ability to exploit information and communications technology; this good news for the United States: it climbed one spot from No. 4 in 2007 to No. 3, and the report says the United States was well placed for a technology-driven recovery as it has the top scientific research institutions in the world and best collaboration between universities and industries
-
-
Taliban continue campaign against cellular service in Waziristan
Taliban and al-Qaeda militants believe that the CIA and U.S. military rely on cellular communication intercepts to track and kill members of the two organizations; Taliban leaders warned Pakistan not to expand the cellular network in the areas under Taliban control; those networks already in place must be shut down overnight
-
-
Video on beyond line-of-sight high-bandwidth connection possible
Boeing demonstrates that transmitting video on beyond line-of-sight high-bandwidth connection is possible
-
-
Political denial-of-service attacks on the rise
The cases of Estonia in 2007 and Georgia in 2008 illustrate how dedicated denial-of-service attacks can nearly paralyze a country; trouble is, now attackers can purchase tools such as Black Energy or NetBot Attacker, made by Russian and Chinese hackers, respectively, for less than $100 a piece
-
-
Experts: Russian intelligence behind cyber attacks
A panel of IT security experts concluded that there is a “strong likelihood” that the Foreign Military Intelligence agency (the GRU) and Federal Security Service (the FSB) directed cyber attacks on Georgian government servers in July and August of 2008
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.