-
Wireless cyber security center opened
Lockheed Martin opens lab which will allow defense and intelligence agencies to test systems like 802.11 Wi-Fi or broadband satellite links on a Top Secret / Sensitive Compartmented Information (TS/SCI) network
-
-
New method for protecting private data
Researchers develop new method for protecting private data; called “functional encryption,” the new approach will not only help to simplify the encryption of data in servers but will also allow access to the data in an intuitive way, making it much harder for hackers to gain access to sensitive information but much easier for programmers to secure it
-
-
Swedish researchers find vulnerability in quantum encryption technology
Quantum encryption is supposed to offer air-tight security owing to the laws of quantum mechanics; to send a key over the quantum channel you must simultaneously send additional data over the traditional Internet channel, and then verify that the classical data has not been changed through an authentication process; data traveling though the quantum channel was 100 percent secure, but the combined system showed vulnerabilities
-
-
DHS launches massive effort to bolster cyber security
Last week DHS secretary announced a Manhattan Project-like campaign to bolster federal cyber security; a key element of the project: Federal agencies will cut the number of communication points through which agencies connect to the Internet from 4,000 to less than 100
-
-
New technology allows for better communication on the battlefield
Multi-User Detection technology allows radios to transmit at the same time while sharing the same frequency; MUD allows more traffic on various networking systems, which is an advantage to military personnel with critical need for high throughput air-to-air, air-to-ground, and soldier-to-soldier communications
-
-
Cobham acquires MMI Research
Large U.K. defense contractor acquires specialist in cellular telecommunications for the law enforcement and national security markets
-
-
Japanese firms to begin IT security rating
Eighteen Japanese firms announced they were creating the world’s first ratings agency looking at data security, which they said was a rising concern for companies
-
-
SyTech Corporation and communication interoperability, I
The lack of communication interoperability among first response, rescue teams, and law enforcement during the 9/11 attacks and Hurricane Katrina was only the most dramatic and poignant demonstration of a persistent and debilitating flaw in U.S. agencies’ planning for disaster — and performing during disaster; communication interoperability is essential not only in disasters, but for routine, every-day operations of law enforcement; SyTech’s comprehensive approach to interoperability offers a solution
-
-
EU selects Symantec for WOMBAT project
WOMBAT aims to provide new means for understanding the existing and emerging threats which are targeting the Internet economy and its users; EU selects Symantec to do research for the project
-
-
U.S. military prepares for offensive cyber warfare
The new U.S. Air Force Cyber Command said it would be involved in protecting the U.S. critical infrastructure and financial institutions from hackers’ attacks; the military now says that it is preparing for offensive cyber operations
-
-
Cisco shows Cisco Open Platform for Safety and Security
New solution facilitates business continuity and force protection mission alike; in addition to incorporating Cisco’s own surveillance and network security technologies, new solution supports sensor integration and management, video analytics, geographic information system (GIS) framework for common operating picture, enterprise mass emergency notification, and physical access control
-
-
Microsoft joins MIT Kerberos Consortium
Kerberos develops the widely used network authentication standard; eight years ago Microsoft was accused of subverting the standard by adding proprietary extensions; after Microsoft lost both U.S. and European anti-trust trials, company joins consortium
-
-
Reported Internet crime losses increase by $40 million
In 2007, 206,884 U.S. citizens complained of being victims of Internet crime; 90,000 cases were referred to law enforcement; reported losses amounted to $240 million; most reported complaint: Fraudulent Internet auctions
-
-
U.S. Cyber Command to fight cybercrime
New Air Force command will be involved in fighting cyber crime which leads to information loss or possible physical attacks through denial of service
-
-
This weekend: 32nd annual computing Battle of the Brains
The 32nd annual collegiate programming contest will take place this weekend in Alberta, Canada; one hundred three-person teams from thirty-three countries have qualified; twenty of the teams represent U.S. colleges
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.