-
Aussies review e-security
The Rudd government undertakes a wide review of e-security measures; review could lead to changes in funding committed to a number of agencies in 2007 by the Howard government in its four-year, $73.5 million e-security national agenda
-
-
Security flaw prompts major Web alert
Internet security specialist discovers major flaw in the Internet’s Domain Name System (DNS); the flaw allows hackers to inject themselves into the URL-typing process, intercepting the name entered by the user and mapping it to a different Internet address than the one intended
-
-
Data leaks top concern for corporate computer users
New study shows that data leaks are becoming a leading source of headaches for U.S., U.K., German, and Japanese companies
-
-
New organization to fight multi-product threats
Five big technology hitters create a new organization aiming to address complex, multi-product, multi-vendor security threats
-
-
U.S. federal agencies ready for IPv6 D-Day (which is today)
Agencies expect to meet 30 June deadline; future of IPv6 awaits new president; IPv4 — the current version of the Internet — is running out of address space; IPv6 provides many more addresses — 2 to the 128th power
-
-
Wireless communication under water
Acoustic time reversal cleans up underwater sound signals, extending their range and capacity
-
-
Protecting IT infrastructure
The U.S. National Weather Service says that 910 storms had already been recorded by mid-May, a considerable number when compared with 1,093 confirmed tornadoes for all of 2007; U.S. business had better be prepared
-
-
Addressing the vulnerability of IP-based infrastructure security
The growing reliance on IP networks to control security systems offers greater efficiency but also increased vulnerability; one of the promising trends in the network security world is that of unidirectional connectivity which allows data to pass between networks in one direction only
-
-
Top 10 rules for combating cyber attacks
Califonira-based security specialist offers useful rules for protecting the control systems of critical infrastructure and industrial facilities fro maliciuos intrusion
-
-
New Web threats threaten OS, other applications
IBM researchers release proof-of-concept for new cross-environment hopping (CEH) attack methods
-
-
Corporations riddled with security holes
How safe is your network? If you are a typical U.K. organization, the answer is: “Not very safe”; three expert reports paint a damning picture of business security, with online vulnerabilities rising as companies and authorities fail to apply patches, update antivirus software, and leave firewalls disabled
-
-
China in campaign to impriove coastal water, inland waterways security
China has a long coast and many rivers and canals; there are about 200,000 boats and ship plowing these waters, the the Chinese authorities want them to be able to communicate more effectively with security and law enforcement; U.K. company helps
-
-
Cybercrime server with 500 Mb of personal data discovered
IT security company discovers a hackers’ crimeserver containing 500 Mb of personal, health care, and financial data for sale to the highest bidder
-
-
New Trojan targets Australian business bankers
A systematic phishing campaign has been targeting Aussie financial institutions; a Trojan masked as a bank’s security update proceeds to launch a multi-staged attack, looking for not just usernames and passwords, but chat room credentials, secure downloads, and anything the attackers believe may be useful
-
-
New Air Force Cyber Command politically savvy
One way to secure the Hill’s backing — and bucks — for any new program is to spread it over as many states and congressional districts as possible; AFCYBER may be a new outfit, but its leaders are perfectly aware of this old political truth
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.