-
Verizon, AT&T win DHS contracts
Verizon, AT&T win contracts worth nearly $1 billion to provide DHS with IP and security services as well as emergency communication services
-
-
Banks rely on spyware to detect rogue traders, false rumors
Growing worries about the financial consequences of rogue traders’ unauthorized activity and false rumors spread in order to manipulate stock price, more and more companies – especially in the financial sector – are installing spyware to monitor their employees’ every move and utterance
-
-
WorkLight says RSA chief's observations ring true
RSA boss Art Coviello offers his insights on Web security, saying that hackers are developing plans to attack healthcare providers as their revenue streams from the financial services sector start to dry up; Coveillo also says that biometric technology is not a solution for IT security – at least so far
-
-
An HSDW conversation with John Stroia, vice president, Government Security and Monitoring Solutions, Diebold
Diebold has been adding “layers of protection” to its customers since 1859; Diebold provides one-stop shopping for technology-based electronic systems, software, and services, and the company is active in all four major security markets: financial; commercial (retail); enterprise (large corporations); and government
-
-
Tyco sells M/A-COM for $425 million
Tyco sells its radio frequency components and subsystem business to Cobham Defense Electronic Systems
-
-
NATO to help Estonia’s cyber defense
Last year Estonia became the first nation to suffer a systematic, sustained cyber attack that brought the Baltic nation’s infrastructure to halt; Russian nationalists, and probably agencies of the Russian government, were implicated in the attack; NATO wants to help
-
-
The economics of cyber - and infrastructure -- security
New book explores the economics of protecting cyberspace; the book “links our nation’s critical infrastructures across public and private institutions in sectors ranging from food and agriculture, water supply and public health, to energy, transportation and financial services,” says one of the authors
-
-
Emergence of violent Islamist groups in U.S. aided by Internet
The Internet helps fuel – and channel – Islamic extremism in the United States; a congressional report says that the U.S. government has “no cohesive and comprehensive outreach and communications strategy in place to confront this thread.”
-
-
Hacker posts data of six million Chileans
The personal information of one-third of the Chilean population posted on the Web, including information on the prime minister’s two daughters
-
-
FBI probes counterfeit Chinese network gear
The FBI launched Operation CiscoRaider aimed at getting to the bottom of a potentially serious problem: Counterfeit Cisco routers made in China and sold to U.S. IT vendors working on sensitive government computer systems; there is fear that the forged hardware would allow a Chinese intelligence backdoor into secret U.S. information
-
-
U.S. wireless landascpe about to change
Clearwire, Sprint Nextel to form $14.55 billion wireless company which will deploy WiMAX networks across the United States; WiMAX’s speed dwarfs current wireless technologies, holding the potential of rendering cable and phone line Internet obsolete
-
-
Malicious hardware may be next hacker tool
Next threat on the computer security front: Malicious hardware; malicious hardware is more problematic because it is more difficult to detect; China is already using an early, and simple, version of malicious hardware in its massive military and industrial espionage campaign against Western countries and companies
-
-
Cybersecurity agenda for the next president
Cybersecurity is not a technical issue, but a matter of culture, education, and self-interest; government cannot regulate information technology security, and industry cannot do the job by itself
-
-
Security companies criticize Defcon virus contest
Hackers’ event, Defcon, will hold a contest to see who can develop the best virus to beat antivirus software; prizes range from “Most elegant obfuscation” to “Most deserving of beer”; antivirus vendors upset
-
-
U.K. government split over mobile threat
U.K. agencies divided over the scope and imminence of wireless systems which control the nation’s critical infrastructure
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.