-
Cybercrime gangs highly structured
The chain of command of a cybercrime gang is not unlike the Mafia, an evolution which shows how online crime is becoming a broad, well-organized endeavor
-
-
Criticism of delays in coordinating national emergency communication
Congress criticizes DHS for delays in coordinating a national emergency communications plan for first responders
-
-
Draft security publication looks at cell phones, PDAs
PDAs are offering more and more features, and more people now use them; NIST publishes a draft guidelines on security considerations for cell phones and PDAs
-
-
Smart-card manufacturers sues to suppress security flaw information
NXP Semiconductors is suing Radboud University Nijmegen to prevent university researchers from presenting a paper in an October conference on IT security; paper in question details serious security flaws in the company’s RFID chip
-
-
Aussies review e-security
The Rudd government undertakes a wide review of e-security measures; review could lead to changes in funding committed to a number of agencies in 2007 by the Howard government in its four-year, $73.5 million e-security national agenda
-
-
Security flaw prompts major Web alert
Internet security specialist discovers major flaw in the Internet’s Domain Name System (DNS); the flaw allows hackers to inject themselves into the URL-typing process, intercepting the name entered by the user and mapping it to a different Internet address than the one intended
-
-
Data leaks top concern for corporate computer users
New study shows that data leaks are becoming a leading source of headaches for U.S., U.K., German, and Japanese companies
-
-
New organization to fight multi-product threats
Five big technology hitters create a new organization aiming to address complex, multi-product, multi-vendor security threats
-
-
U.S. federal agencies ready for IPv6 D-Day (which is today)
Agencies expect to meet 30 June deadline; future of IPv6 awaits new president; IPv4 — the current version of the Internet — is running out of address space; IPv6 provides many more addresses — 2 to the 128th power
-
-
Wireless communication under water
Acoustic time reversal cleans up underwater sound signals, extending their range and capacity
-
-
Protecting IT infrastructure
The U.S. National Weather Service says that 910 storms had already been recorded by mid-May, a considerable number when compared with 1,093 confirmed tornadoes for all of 2007; U.S. business had better be prepared
-
-
Addressing the vulnerability of IP-based infrastructure security
The growing reliance on IP networks to control security systems offers greater efficiency but also increased vulnerability; one of the promising trends in the network security world is that of unidirectional connectivity which allows data to pass between networks in one direction only
-
-
Top 10 rules for combating cyber attacks
Califonira-based security specialist offers useful rules for protecting the control systems of critical infrastructure and industrial facilities fro maliciuos intrusion
-
-
New Web threats threaten OS, other applications
IBM researchers release proof-of-concept for new cross-environment hopping (CEH) attack methods
-
-
Corporations riddled with security holes
How safe is your network? If you are a typical U.K. organization, the answer is: “Not very safe”; three expert reports paint a damning picture of business security, with online vulnerabilities rising as companies and authorities fail to apply patches, update antivirus software, and leave firewalls disabled
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.