-
Mobile torrents are a cell phone security nightmare
Mobile torrents represent incredible access to mobile applications and other content, but for mobile security providers mobile torrents will be a security nightmare; for mobile security providers mobile torrents will be a security nightmare
-
-
IT security group concerned over VoIP safety
Leading member of Jericho Forum criticizes the security of VoIP technology after researchers reveal that it was possible to eavesdrop on VoIP conversations
-
-
Federal CISO: No contradiction between mobility and security
The need to prepare for disaster and the growing availability of technology have combined to promote telework — but is there a contradiction between mobility and security? New study says “no”
-
-
Lessons of Estonia: Ten steps to prepare for cyberwar
Two months ago Estonia came under a coordinated cyber attack; experts say the attack — and Estonia’s response — tell us how IT executives can prepare for the worst
-
-
Corporations demand enhanced cybersecurity
Chief information security officers want the high-tech industry to offer better security tools for their companies; these CISO have formed the Jericho Forum better to advance their case
-
-
New managed Web security system for a London borough
Web Security-as-a-Service (SaaS) is an emerging business model, and the London borough of Barnet calls on California-based ScanSafe to deploy its system for the council
-
-
Lawmakers unhappy with slow progress on emergency wireless project
The integrated wireless network (IWN) is one of the most expensive items among Justice’s information technology projects, but the department’s IG says it is at high risk of failure; Senators cut the program’s budget
-
-
Encryption specialist Voltage Security reports good results
The growing popularity of one of the company’s products — Voltage Security Network — proves the viability of security-as-a-service business model
-
-
Cumbersome federal acquisition rules an obstacle to IT flexibility
Cumbersome acquisition rules designed for building weapons systems and computing platforms are hampering adoption of rapidly evolving information technology networks
-
-
Messaging- and storage compliance technologies on the rise
More and more organizations deploy solutions which govern what employees can or cannot put into e-mails, instant messages, Web postings, and offline documents; trend moving beyond tightly regulated industries such as health care and financial services
-
-
Study reveals growing awareness of security among mobile employees
Cisco, which sponsored the study, says: “What’s key is knowing that the issues outlined in this study can be prevented”
-
-
Bugs found that can turn security tools against their users
Researchers find parser flaws that may cause defense-in-depth of corporate computers to backfire
-
-
FBI selects NCSA as host of new cybersecurity center
Bureau provides Fighting Illini cuber security center with $2 million to launch new National Center for Digital Intrusion Response
-
-
Pulses of light dramatically accelerate quantum computers
Wolverine researchers use pulses of light to accelerate quantum computers; important step for developing technology to foil national and personal security threats
-
-
APCO: 700 MHz proposal offers voice potential
The LMR is not dead yet: The FCC has approved dedicationg a portion of the 700 MHz band to public safety, trouble is, many in public-safety communications have been wary of IP-based voice technologies; APCO says the band can accommodate voice
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.