-
FBI: U.S. facing "cybergeddon"
FBI experts say that cyber attacks pose the greatest threat to the United States after nuclear war and weapons of mass destruction — and these attacks are increasingly hard to prevent
-
-
U.K. Home Office denies remote snooping plan
There have been discussions among EU ministers about giving police more authority to snoop on crime and terror suspects remotely, but the legal framework to do so is yet be created; what is more, techies says it cannot be done
-
-
New, major weakness in Internet security reported
New weakness discovered in Internet security; the vulnerability allows impersonation of secure Web sites and e-mail servers; it also allows hackers to perform virtually undetectable phishing attacks
-
-
Russia's hackers a growing global threat
There used to be a time when Russian hackers exposed chinks in American software just for the thrill of it; today they do it for cash — or for political reasons; cybercrime has outpaced the amount of illicit cash raked in by global drug trafficking
-
-
2008 was a good year for cybercrime
Cybercrime has become more sophisticated in 2008; security firms now say there are about 20,000 new malicious programs created every day, and Symantec reached a grim milestone: its antivirus software now protects against more than one million viruses
-
-
Even in tough times, IT security should not be short changed
In tough economic times, IT managers — as do other managers — look for ways to cut costs and expenses; they should realize, though, that in tough economic times IT security may become even more important than during more normal times
-
-
IRS's IG says agency IT staff too lax
IG report says IT staff were not always saving or reviewing system audit logs, and clock settings on some firewalls and routers did not comply with IRS rules, increasing likelihood of unauthorized intrusion
-
-
AT&T awarded contract to deliver secure Internet connections to federal agencies
The Networx program — Networx Universal and Networx Enterprise — is the the U.S. federal government’s largest telecommunications program, with a ceiling of $48.1 billion over ten years; AT&T wins a chunk of Networx Universal
-
-
Microsoft releases critical Internet Explorer patch
The update fixes a JavaScript-related vulnerability which is being actively exploited through hacked Web sites
-
-
Radioactive-waste tracking software deployed at U.K. nuclear sites
The radioactive-waste tracking software developed by Tennessee-based AttentionIT will be deployed in decommissioned U.K. nuclear facilities; the waste tracking software provides electronic storage of information related to “cradle to grave” treatment of radioactive and mixed waste
-
-
Mobile security market to reach $890 million by 2011
Mobile security market will continue to grow, driven by backhaul and data center upgrades
-
-
Five myths about two-factor authentication
Too many organizations allow themselves to be vulnerable to cybercrime because of prevailing myths about the cost, inconvenience, and efficacy of two-factor authentication; close examination reveals these myths to be just that — myths
-
-
The next version of FISMA
The first version of the Federal Information Security Act (FISMA) of 2002 placed much emphasis on auditing and reporting; it is time to move on beyond checking compliance boxes and concentrate on making sure that the security of government departments is not compromised
-
-
Researchers inadvertently release IE7 attack code
Chinese researchers fail to note that the last security patch released by Microsoft did not take care of a problem they had earlier identified; thinking the problem has been fixed, the researchers release code that might be misused to exploit an unpatched IE 7 vulnerability
-
-
Hackers target rich content files
New security report says that PDF and Flash files will be used by cybercriminals much more in 2009
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
By John Tucker
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.