-
Hackers hacked at DefCon gathering
The tens of thousands of networks handling traffic on the Internet are programmed to trust each other for the best routes for data; a bad idea — since a hacker can hijack traffic to and from Web sites of choice by adding enough numbers to computer addresses to have his or her network automatically deemed the best path for the data
-
-
AuthenTec offer scanners for fingerptint-enabled phones
AuthenTec has shipped more than seven million AuthenTec-enabled phones powered by the Symbian OS, comprising 14 mobile phone models using AuthenTec’s fingerprint sensors
-
-
Social networking sites are target-rich opportunity for hackers
Social neyworking sites — Facebook, MySpace, LinkedIn — are becoming more popular for both users and hackers; the biggest danger from social networking sites is that they embed powerful features that only few subscribers actually use, such as digital image or media files with the ability to download content from third-party Web sites, which expose users to risk
-
-
House's measures strengthen cybersecurity
House passes eight measures intended strengthen cybersecurity, promote greater sharing of unclassified information, and prevent the over-classification of information
-
-
Hacker of U.S. defense computers about to be extradited to U.S.
Seven years ago Gary McKinnon, a U.K. citizen, hacked into 92 computer systems at the U.S. Army, the U.S. Air Force, the Department of Defense, and NASA; he said he was hoping to uncover evidence of UFOs; his string of appeals exhausted, he is to be extradited soon
-
-
Hackers' attacks on U.S. government systems are frequent, serious
U.S. government computer systems under frequent and serious attacks by other governments and organizations; James Finch, assistant director of the FBI’s cybercrime division: “We’re not worried so much about the noisy attacks as we are about the quiet ones”
-
-
Beckstrom: Networking security worth the money
Rod Beckstrom, director of the U.S. Department of Homeland Security’s National Cybersecurity Center, tells Black Hat that “We want to invest in protocols because it may be some of the cheapest security dollars we can spend”
-
-
Kaminsky offers details of DNS flaw
Dan Kaminsky tells Black Hat attendees about the DNS vulnerability he discovered a few months ago; “We have to get better about fixing the infrastructure,” Kaminsky said; “We got lucky fixing this bug but may not be so lucky next time.”
-
-
New approach to virus protection
Wolverines researchers describe a new method of protecting computers against viruses by moving antivirus functionality into the “network cloud” and off personal computers
-
-
Ensuring uptime at the Games
Technology glitches at previous Olympics have lead to problems such as the inability to feed competition results into official Web sites and media outlets; Chinese security officials must also contend with individuals and groups of hackers attacking systems during the Olympics
-
-
Giant online security hole getting fixed, slowly
Serious DNS security flaw was discovered a month ago, a flaw which allowed criminals silently to redirect traffic to Web sites under their control; more details will be given at today’s Black Hat event
-
-
FEMA's still struggles with IT security issues
DHS’s IG reports that “These issues collectively limit FEMA’s ability to ensure that critical financial and operational data is maintained in a manner to ensure confidentiality, integrity and availability”
-
-
Tuffin Technology's products win F&S award
Security and network operations are becoming increasingly complex. Large enterprises have multiple firewalls spread across different time zones and business units and are also required to comply with stringent regulatory requirements; Tuffin Technology offers management solutions to help businesses cope
-
-
DHS releases national emergency communications plan
Seven years after 9/11, and three years after Katrina, DHS releases the U.S. first strategic plan aimed at improving emergency response communications
-
-
Security flaws in online banking sites widespread
Researchers find widespread security flaws in online banking Web sites; these design flaws are not bugs that can be fixed with a patch; rather, they stem from the flow and the layout of these Web sites
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.