-
Large defense contractors look for cyber-security business
Cyber attacks on U.S. government networks and private companies have grown exponentially; the result is a vast increase in the attention paid to, and money spent on, cyber security; the biggest U.S. military contractors are counting on winning billions of dollars in work to protect the U.S. federal government against cyber attacks
-
-
Critic: U.K. fraud strategy "more worthy of Uzbekistan"
Business fraud costs Britain £14 billion a year; the U.K. government today launched its National Fraud Strategy, but a Cambridge professor harshly criticizes the initiative
-
-
Leading browsers easily felled at hacker contest
Students at a hacker convention easily breach the protections built into Safari, IE 8, and Firefox; contestants do so in front of appreciative spectators and in a matter of hours
-
-
CSC to help combat cyber warfare
Cyberattacks pose a major threat to the welfare and security of developing countries; developing protection against that threat offers business opportunities
-
-
Cyber criminals already using March Madness for their scams
March Madness begins at the end of this week, but cyber criminals are already exploiting the popular college basketball event for their nefarious purposes
-
-
Yoran: Better metrics needed for security
Amit Yoran says that the security industry is awash in bad data, and that companies that attempt to use the metrics could take the wrong actions
-
-
UNC students win cyber defense competition
University of North Carolina students win, for the second time in four years, the DHS-sponsored Southeastern Region Collegiate Cyber Defense Competition
-
-
New York City is especially vulnerable to rise in sea level
Although low-lying Florida and Western Europe are often considered the most vulnerable to sea level changes, the northeast U.S. coast is particularly vulnerable because the Atlantic meridional overturning circulation (AMOC) is susceptible to global warming
-
-
2007 cyber attack on Estonia launched by Kremlin-backed youth group
Sustained cyber attacks in April and May 2007 on Web sites of the Estonian government paralyzed many government functions and commercial activities; it was the first such sustained attack on a country’s networks
-
-
Critics: Commercially driven deep packet inspection (DPI) is akin to wiretapping
New technology now allows third parties to engage in deep packet inspection (DPI), a technique that makes it possible to peer inside packets of data transmitted across the Internet; data collected is then sold to other companies to allow them more targeted advertising
-
-
U.S. slow to pinpoint source of cyber attacks
U.S. director of national intelligence tells lawmakers that “It often takes weeks and sometimes months of subsequent investigation [to identify the source of a cyber attack]… And even at the end of very long investigations you’re not quite sure who carried out the offensive”
-
-
France, Ireland to launch e-crime police training programs
With the problem of cyber crime looming ever larger, European universities want the EC to back a plan to create an academically accredited cybercrime training program for law enforcement
-
-
U.K. government shelves multi-million intelligence net project
The project, dubbed Scope, was designed to move security intelligence into the twenty-first century with the replacement of a systems for distributing reports by paper with an electronic system; government abandons project for unspecified technical problems
-
-
Personal information of 80,000 NYPD officers stolen
A NYPD pension telecommunications director swiped backup tapes that contained addresses, Social Security numbers, medical records, and direct-deposit information on nearly 80,000 current and retired police officers
-
-
New cybersecurity guidelines simplify, prioritize protections
NIST issues guidelines which aim to simplify the thousands of pages of cybersecurity guidance from the National Institute of Standards and Technology; managers say the NIST guidance is hard to implement and harder to audit
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.