-
Riding the Next Wave -- WiMAX versus LTE // by Peter Howard
By 2011, it is estimated that 1.5 billion people will have broadband; which technology will better serve their needs — WiMAX or LTE? WiMAX is already here, and LTE will take time to roll out — but when it does, it will give WiMAX a run for its money; LTE offers spectrum flexibility, significant added capacity, and a platform for delivering premium applications cost effectively
-
-
Private-sector support for telecommuting grows
Heightened concerns about traffic congestion, air pollution, and gasoline prices — and worries about business continuity — increase the attraction of telecommuting; new CDW report reveals that support for telecommuting grows, but is offset by security concerns
-
-
Preparing for the electromagnetic pulse (EMP) threat
One unexpected lesson of the many nuclear tests conducted by the superpowers in the late 1950s and early 1960s was that high-altitude nuclear blasts create far-reaching atmospheric effects that could instantly shut down power grids; as modern life becomes ever-more dependent on electronic gadgets, and as the proliferation of nuclear weapons and missiles continue, fear grows that an adversary will seek to cripple the United States by creating an atmospheric EMP effect
-
-
Rod Beckstrom to head NCSS
DHS taps Silicon Valley serial entrepreneur Rod Beckstrom to head new cyber security outfit; Beckstrom’s task is to secure the government IT systems
-
-
Debate over data security breach insurance continues
With more and more stories about data security breaches at major companies with millions of customers, the question arises: Should companies, as part of their business continuity plan, take out data security breach insurance? Industry insiders, analysts offer a range of opinions
-
-
VigilancePro from OpticVision
VigilancePro offers organizations protection from both internal and external threats; this endpoint security solution allows organizations to set their security and alert policies; it integrates with existing security systems; and it connects physical and digital security to fill the gaps in existing IT security infrastructures
-
-
TeleContinuity granted Type II carrier license in Japan
Japan is earthquake prone, so Japanese companies and organizations are especially interested in business continuity and disaster recovery solutions; one innovative communication continuity solution comes from TeleContinuity, and the prediction here is that the Type II carrier license, and a good distribution agreement with ECOSS Japan, would make the company’s products a success in the not-always-easy-to-penetrate Japanese market
-
-
Advanced software identifies complex cyber network attacks
By their very nature networks are highly interdependent and each machine’s overall susceptibility to attack depends on the vulnerabilities of the other machines in the network; new software allows IT managers to address this problem
-
-
More than 4 million credit, debit cards exposed in security breach
Supermarket chain Hannaford Bros., with 270 stores nationwide, says that a security breach in its system exposed 4.2 million credit and debit cards; 1,800 cases of fraudulent use already detected
-
-
Serious RFID vulnerability discovered
A group of a Dutch university’s digital security researchers discovers a major security flaw in a popular RFID tag; discovery can have serious commercial and national security implications; as important as the discovery itself was how the researchers handled the situation
-
-
MI5 seeks powers to trawl records in new terror hunt
As part of the Brown government’s new counterterrorism strategy, which places emphasis on thwarting a cyber-attack on the United Kingdom, MI5 seeks total access to commuters’ travel records to help them meet the threat
-
-
Age-old communication problem solved using quantum entanglement
One of the major problems in communication is known as the Byzantine agreement: Messages between three different parties are subject to faulty information; researchers succeeded in overcoming the qutrit difficulties by setting up a system that creates four-qubit entangled states
-
-
Economic barriers to better IT security
In the real world, investment in risk avoidance may not be profitable; establishing economic incentives for IT suppliers to produce more secure products is a major problem because software publishers are not held liable for the shortcomings of their products; a new paper examines this conundrum
-
-
U.S. officials: "Cyber Warfare Is Already Here"
U.S. officials say China, Russia, and possibly other nation-states are capable of collecting or exploiting data held on U.S. information systems; Director of National Intelligence says especially worrisome is the ability of other countries to destroy data in the system: “And the destroying data could be something like money supply, electric power distribution, transportation sequencing and that sort of thing”
-
-
New consortium to develop safety critical software
High Integrity and Safety Critical Software (HI&SCS) is “the critical enabling technology” (U.K. Ministry of Defense’s words) for modern defense platforms, network enabled capability, and complex infrastructure; York University to lead a industry-academia consortium to develop such software; consortium will emulate the U.S. Software Engineering Institute
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.