-
Cyber war fears grow after Georgia Web sites attacked
Analysis of the attacks on official Georgia’s Web sites during and following the 8 August Russian incursion lead experts to suspect that rather than initiated by the Russian government, the attacks were the result of cyber “militias” or “hacktivists”; this is worrisome because it highlights the ability of small bands of hackers, let alone governments, to disrupt communication networks and critical infrastructure
-
-
Data breaches in U.S. already surpass 2007 total
The number of reported data breaches in the United States has already surpassed 2007’s total; more states now require breach reporting; experts also say that the development of SQL injections made breaches much easier
-
-
Bay Area's FasTrak road tolls easy to hack
Toll transponders can be cloned, allowing fraudsters to travel for free while others unwittingly foot the bill; more seriously, criminals could use the FasTrak system to create false alibis by overwriting one’s own ID onto another driver’s device before committing a crime
-
-
New system thwarts Internet eavesdropping
The growth of wireless networks has increased the risk of eavesdropping on Internet communications; Carnegie Mellon researchers develop a low-cost system that can thwart these Man-in-the-Middle (MitM) attacks
-
-
Britain "under constant attack in cyberwar"
The U.K. government warns a cyberwar is being waged against Britain with key computer networks coming under attack every day
-
-
EAGLE task order opportunities
With the federal fourth quarter underway, vendors are wondering where end-of-year spending will happen; task order vehicles are an obvious place to look because task orders can be competed and awarded quickly; DHS’s EAGLE task order is one example
-
-
New immunization strategy better in handling epidemics, computer viruses
New immunization approach fragments the population to be immunized into many connected clusters of equal size; by creating equal-size clusters, doses do not have to be “wasted” on isolating very small clusters, as in the traditional targeted strategy
-
-
Legal skirmish over Defcon talk shows divide on disclosing security flaws
Gag order slapped on MIT students who prepared a talk about Boston transit authority security flaw reignites debate over what “responsible disclosure” of security flaw means
-
-
Indian SMBs will spend $289 million on security related investments this year
Business in India are becoming more aware of security threats and the need for continuity planning; the top three key trends among India SMBs are UTM (Unified Threat Management), BCS (Business Continuity Solutions), and MSS (Managed Security Services)
-
-
GSA implements IPv6
GSA becomes the first civilian agency to implement IPv6; the current IPv4 uses 32-bit addresses, meaning it can offer about 4.3 billion addresses total; IPv6 uses 128-bit addresses, so it can offer an almost unlimited number of addresses — the first step toward achieving fully networked functionality among all electronic devices
-
-
Pentagon suspends USAF cyber effort
The growing dependence of governments and militaries on the Internet has led the U.S. Air Force to create a new Cyber Command; the Air Force has now put this effort on hold
-
-
Who is behind cyber attacks on Georgia?
Sustained cyber attacks of Georgian official Web sites, attacks which immediately preceded and then accompanied the Russian military action against the former Soviet republic, originated from a “hacker militia” of Russian botnet herders and volunteers
-
-
Five steps to safer virtual servers
At the Black Hat conference, HP chief security strategist provided virtualization security advice
-
-
DOJ cybercrime task force shows results
Two years ago the U.S. Department of Justice created Identity Theft Task Force, and has supported its work through vigorous prosecution of the various forms of identity theft
-
-
Russia-Georgia conflict shows new frontier in war
Internet attacks on Georgia highlight a key flaw for more than 100 nations: most of these nations’ external connections go through other countries, and there is a lack of internal connections called Internet exchange points
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.