-
Debunking IT myths
As IT spreads, so do IT myths and legends; two experts debunk some of the more popular myths
-
-
The 25 most dangerous places for offshore outsourcing
Are you thinking about outsourcing your company’s back-room work to companies in Bogota, Bangkok, or Johannesburg? Think again; here is a list of the 25 worst outsourcing cities
-
-
U.K. pushes data infrastructure protection
U.K. government announces £6 million of research funding in the field of data infrastructure protection; application deadline is 23 April
-
-
President's proposed 2010 budget shows DHS priorities
Proposed budget increase DHS budget by 6 percent; priorities include cyber security, helping TSA screen travelers, increase bomb disposal and counter-IED capabilities, border security, emergency response
-
-
New software allows laptops to talk back boldly to laptop thieves
Your laptop has been stolen? New software allows you to tell those thieves exactly — and when we say exactly, we mean exactly — what you think of them; software also helps police locate the stolen computer
-
-
Intelligence, law enforcement face another hurdle: encrypted VoIP
The intelligence community and law enforcement already are concerned about the difficult they have eavesdropping in Skype communications; a U.K. start-up is going to make life more difficult for them by encryption VoIP communications and concealing more conversations
-
-
EU may investigate VoIP eavesdropping
Italian anti-crime authorities have asked the EU to look into regulating VoIP communication encryption; the Italian authorities presented evidence that crime rings and prostitution networks use Skype for the specific purpose of frustrating police investigators
-
-
Guidelines for government, private IT security issued
A coalition of government and private organizations releases a preliminary set of guidelines for IT security controls; guidelines will become a foundation for a standardized approach to securing the nation’s critical information infrastructure
-
-
Institute: Better coordination needed for cybersecurity R&D
I3P calls for improved coordination for cybersecurity research and development efforts
-
-
New study emphasizes the risk posed by insider threats
Many information security programs focus on preventing unauthorized outsiders from accessing an information system; insiders, however, often are in a better position to cause just as much damage because they are trusted by their organization
-
-
U.S. under growing cyber attacks
The number of cyber attacks on U.S. government computers and networks grow; there were 5,488 tracked incidents of unauthorized access to U.S. government computers and installations of hostile programs in 2008, compared to 3,928 such incidents in 2007, and 2,172 in 2006
-
-
DHS receives IT money in stimulus package
DHS receives a $2.8 billion boost from the new stimulus package; largest single item is for TSA’s installation of checked baggage explosive detection systems
-
-
Unisys: Technology "consumerization," mobility risks key drivers of security investments
A Unisys briefing says that the growing pervasiveness of technology consumerization and mobility opens businesses to new risks across a broader spectrum; economy compels greater need for collaboration, more intelligent systems, and better fraud prevention; biometric use and acceptance also to increase
-
-
Microsoft offers reward for catching worm creator
Microsoft offered a reward of $250,000 to find who is behind the Downadup/Conficker virus; since it started circulating in October 2008 the Conficker worm has managed to infect millions of Windows computers
-
-
Researchers spoof, bypass face-recognition authentication systems
Vietnamese researchers have cracked facial recognition technology in Lenovo, Asus, and Toshiba laptops; the researchers demonstrated feat at this week’s Black Hat DC event
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.