• Cyber attacks grow in sophistication, menace; most originate in China

    More and more cyber attacks on organization aim to allow criminals to take control over enterprise assets; most attacks on companies and organizations around the world originate in China

  • Glaring gaps in network security, II

    Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks

  • Glaring gaps in network security, I

    Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks

  • Is the Internet "Critical Infrastructure"?

    The Internet’s architecture is optimized to be cheap and ubiquitous; such a network is never going to be perfectly secure or reliable; transactions that absolutely have to be done correctly and on time need to be done on a dedicated network

  • DHS to keep an eye on access to IT systems

    DHS to create a database of employees, contractors, and consultants with access to DHS computer systems; database will contain names, business affiliations, positions, phone numbers, citizenship, home addresses, e-mail addresses, access records, date and time of access, logs of Internet activity, and Internet protocol address of access

  • IT chiefs warn of cyber-terrorism threat to critical infrastructure

    UN expert dismissed as a dangerous myth the idea that events in the virtual world have only a limited impact on the physical world, saying that technology has “changed the dynamics of terrorism”

  • Hackers to concentrate on moving targets

    Security maven Howard Schmidt says more must be done to bolster mobile defenses

  • Power plants open to hacker attack

    Power plants, dams, and many other critical infrastructure assets are controlled by a system called supervisory control and data acquisition, or SCADA; a Boston technology specialist finds serious vulnerability in the system

  • Alarming open-source security holes found

    A programming error introduced serious security vulnerabilities in millions of computer systems; many systems affected

  • Permanent denial-of-service attack sabotages hardware

    HP’s Rich Smith to demonstrate a permanent denial-of-service (PDOS) attack that remotely wipes out hardware via flash firmware updates

  • Verizon, AT&T win DHS contracts

    Verizon, AT&T win contracts worth nearly $1 billion to provide DHS with IP and security services as well as emergency communication services

  • Banks rely on spyware to detect rogue traders, false rumors

    Growing worries about the financial consequences of rogue traders’ unauthorized activity and false rumors spread in order to manipulate stock price, more and more companies – especially in the financial sector – are installing spyware to monitor their employees’ every move and utterance

  • WorkLight says RSA chief's observations ring true

    RSA boss Art Coviello offers his insights on Web security, saying that hackers are developing plans to attack healthcare providers as their revenue streams from the financial services sector start to dry up; Coveillo also says that biometric technology is not a solution for IT security – at least so far

  • An HSDW conversation with John Stroia, vice president, Government Security and Monitoring Solutions, Diebold

    Diebold has been adding “layers of protection” to its customers since 1859; Diebold provides one-stop shopping for technology-based electronic systems, software, and services, and the company is active in all four major security markets: financial; commercial (retail); enterprise (large corporations); and government

  • Tyco sells M/A-COM for $425 million

    Tyco sells its radio frequency components and subsystem business to Cobham Defense Electronic Systems