-
Illinois most spammed U.S. state
Annual spam report shows Illinois as the most spammed state in the union
-
-
New round of mass Web attacks
Attack tool kit aliased as Asprox is still doing damage to Web sites; kit launches SQL injection attacks to append a reference to the malware file using the script tag, which makes it an efficient crimeware tool
-
-
Cybercrime gangs highly structured
The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor
-
-
Criticism of delays in coordinating national emergency communication
Congress criticizes DHS for delays in coordinating a national emergency communications plan for first responders
-
-
Draft security publication looks at cell phones, PDAs
PDAs are offering more and more features, and more people now use them; NIST publishes a draft guidelines on security considerations for cell phones and PDAs
-
-
Smart-card manufacturers sues to suppress security flaw information
NXP Semiconductors is suing Radboud University Nijmegen to prevent university researchers from presenting a paper in an October conference on IT security; paper in question details serious security flaws in the company’s RFID chip
-
-
Aussies review e-security
The Rudd government undertakes a wide review of e-security measures; review could lead to changes in funding committed to a number of agencies in 2007 by the Howard government in its four-year, $73.5 million e-security national agenda
-
-
Security flaw prompts major Web alert
Internet security specialist discovers major flaw in the Internet’s Domain Name System (DNS); the flaw allows hackers to inject themselves into the URL-typing process, intercepting the name entered by the user and mapping it to a different Internet address than the one intended
-
-
Data leaks top concern for corporate computer users
New study shows that data leaks are becoming a leading source of headaches for U.S., U.K., German, and Japanese companies
-
-
New organization to fight multi-product threats
Five big technology hitters create a new organization aiming to address complex, multi-product, multi-vendor security threats
-
-
U.S. federal agencies ready for IPv6 D-Day (which is today)
Agencies expect to meet 30 June deadline; future of IPv6 awaits new president; IPv4 — the current version of the Internet — is running out of address space; IPv6 provides many more addresses — 2 to the 128th power
-
-
Wireless communication under water
Acoustic time reversal cleans up underwater sound signals, extending their range and capacity
-
-
Protecting IT infrastructure
The U.S. National Weather Service says that 910 storms had already been recorded by mid-May, a considerable number when compared with 1,093 confirmed tornadoes for all of 2007; U.S. business had better be prepared
-
-
Addressing the vulnerability of IP-based infrastructure security
The growing reliance on IP networks to control security systems offers greater efficiency but also increased vulnerability; one of the promising trends in the network security world is that of unidirectional connectivity which allows data to pass between networks in one direction only
-
-
Top 10 rules for combating cyber attacks
Califonira-based security specialist offers useful rules for protecting the control systems of critical infrastructure and industrial facilities fro maliciuos intrusion
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.