-
Wireless communication under water
Acoustic time reversal cleans up underwater sound signals, extending their range and capacity
-
-
Protecting IT infrastructure
The U.S. National Weather Service says that 910 storms had already been recorded by mid-May, a considerable number when compared with 1,093 confirmed tornadoes for all of 2007; U.S. business had better be prepared
-
-
Addressing the vulnerability of IP-based infrastructure security
The growing reliance on IP networks to control security systems offers greater efficiency but also increased vulnerability; one of the promising trends in the network security world is that of unidirectional connectivity which allows data to pass between networks in one direction only
-
-
Top 10 rules for combating cyber attacks
Califonira-based security specialist offers useful rules for protecting the control systems of critical infrastructure and industrial facilities fro maliciuos intrusion
-
-
New Web threats threaten OS, other applications
IBM researchers release proof-of-concept for new cross-environment hopping (CEH) attack methods
-
-
Corporations riddled with security holes
How safe is your network? If you are a typical U.K. organization, the answer is: “Not very safe”; three expert reports paint a damning picture of business security, with online vulnerabilities rising as companies and authorities fail to apply patches, update antivirus software, and leave firewalls disabled
-
-
China in campaign to impriove coastal water, inland waterways security
China has a long coast and many rivers and canals; there are about 200,000 boats and ship plowing these waters, the the Chinese authorities want them to be able to communicate more effectively with security and law enforcement; U.K. company helps
-
-
Cybercrime server with 500 Mb of personal data discovered
IT security company discovers a hackers’ crimeserver containing 500 Mb of personal, health care, and financial data for sale to the highest bidder
-
-
New Trojan targets Australian business bankers
A systematic phishing campaign has been targeting Aussie financial institutions; a Trojan masked as a bank’s security update proceeds to launch a multi-staged attack, looking for not just usernames and passwords, but chat room credentials, secure downloads, and anything the attackers believe may be useful
-
-
New Air Force Cyber Command politically savvy
One way to secure the Hill’s backing — and bucks — for any new program is to spread it over as many states and congressional districts as possible; AFCYBER may be a new outfit, but its leaders are perfectly aware of this old political truth
-
-
Network penetration competition as part of security training
In recent years the goals of computer hackers have changed; the intent of many hackers used to be the thrill of breaking into a network, now the goal is often money; companies and other organizations had better take network security more seriously.
-
-
Cyber mishap causes nuclear power plant shutdown
Worries about critical infrastructure vulnerabilities: The move to SCADA systems boosts efficiency at utilities because it allows workers to operate equipment remotely, but experts say it also exposes these once-closed systems to cyber attacks
-
-
Top ten rules for IT security
Uniloc offers ten useful rules to keep the organization’s networks safe from intruders and hackers;
-
-
New compression technique makes VoIP vulnerable to eavesdropping
New VoIP compression technique, called variable bit rate compression, produces different size packets of data for different sounds; simply measuring the size of packets — without even decoding them — can identify whole words and phrases with a high rate of accuracy
-
-
Chinese cyber-attacks target U.S. lawmakers
Computers in the office of a Virgnia congressman targted by Chinese hackers; information on four computers in the office of Congressman Frank Wolf, a harsh critic of China’s human rights record, compromised
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.