-
Setback: Laser breaks "unbreakable" quantum communications
Quantum encryption was supposed to make communication completely secure — because quantum mechanics makes it impossible for an eavesdropper to emulate the receiver’s photon detection methods; researchers find flaw in commonly used encryption devices which does allow an eavesdropper to fool the receiver
-
-
Schwarzenegger terminates RFID skimming
As RFID technology becomes more pervasive — people now use it to gain access to offices, properties, children’s nurseries, parking lots, and others areas — concerns have been growing about wireless “skimming” of the information on the RFID tags; California now bans the practice
-
-
China spying on Skype users
Canadian researchers find that China engages in a massive surveillance campaign of users of Tom-Skype, a joint venture between Chinese mobile firm TOM Online and U.S.owened Skype; sensitive words such as “Tibet,” “Taiwan independence,” the Falun Gong, and political opposition to the Communist Party of China are censored and logged
-
-
DHS, industry promote security awareness month
Companies offer tips on avoiding and dealing with attacks; October will also see major cybersecurity initiatives in Europe, Asia
-
-
Briefly noted
DoE’s networks open to cyberattacks… WiMax emulator debuts… DHS’s radiation program to exceed initial cost estimates…
-
-
FCC restarts public safety network in the 700 MHz band
The Federal Communication Commission revives plans for a nationwide emergency network; decision follows disappointing results of the “D Block” auction
-
-
Washington State, Microsoft sue cyber fear mongers
Washington State has one of the nation;s toughest anti-spyware laws, and the state attorney general joins with Microsoft to sue companies which use fear to sell security products
-
-
Web browsers affected by Clickjacking
US CERT issues a warning about a new cross-browser exploit technique called “Clickjacking”; clickjacking gives an attacker the ability to trick a user into clicking on something only barely or momentarily noticeable; thus, if a user clicks on a Web page, they may actually be clicking on content from another page
-
-
Stolen laptops "broadcast" their location to rightful owners
Huskies researchers develop a software tool which uses the Internet as a homing beam; if the thief uses the stolen laptop to connect to the Internet, the owner receives information on the laptop location (and Macintosh owners also recvied a picture of the thief)
-
-
U.S.-based computers launch most cyberattacks in 2008
Computers, or hackers, based in the United States launched most of the cyber attacks in the world between January and September 2008; China-based computers were in second place, and Brazil came in third; United States also led in the number of computers compromised
-
-
Satellite phone company Iridium acquired for $591 million
Iridium made a name for itself for going bankrupt eight years ago and being bought for $25 million; it later donated satellite phones to first responders in the aftermath of Katrina; now it is being acquired for half a billion dollars
-
-
GPS vulnerable to spoofing
GPS technology is ubiquitous in civilian and military applications; Cornell University researchers raise uncomfortable questions by demonstrating how GPS navigation devices can be readliy duped by transmission of fake GPS signals that receivers accept as authentic ones
-
-
Cyber Storm II drill shows ferocity of virtual attack
In March governments from Australia, the United Kingdom, New Zealand, Canada, and the United States ran the largest-ever cyber war games, Cyber Storm II; the drill tested critical infrastructure including dam walls, telecommunications, and government computer networks
-
-
NATO in major anti-terror drill
NATO will hold a two-week comprehensive anti-terrorrism drill in Sardinia; 15 nations, 10 agencies will coordinate land, air, sea, space assets in an effort to smooth communication, information sharing, and operational execution
-
-
Briefly noted
Aussie cyber security needs work… D.C. policy carry iPhones… Surveillance radar in Indonesian straits… HUD awards Iowa critical infrastructure funds…
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.