-
The economics of cyber - and infrastructure -- security
New book explores the economics of protecting cyberspace; the book “links our nation’s critical infrastructures across public and private institutions in sectors ranging from food and agriculture, water supply and public health, to energy, transportation and financial services,” says one of the authors
-
-
Emergence of violent Islamist groups in U.S. aided by Internet
The Internet helps fuel – and channel – Islamic extremism in the United States; a congressional report says that the U.S. government has “no cohesive and comprehensive outreach and communications strategy in place to confront this thread.”
-
-
Hacker posts data of six million Chileans
The personal information of one-third of the Chilean population posted on the Web, including information on the prime minister’s two daughters
-
-
FBI probes counterfeit Chinese network gear
The FBI launched Operation CiscoRaider aimed at getting to the bottom of a potentially serious problem: Counterfeit Cisco routers made in China and sold to U.S. IT vendors working on sensitive government computer systems; there is fear that the forged hardware would allow a Chinese intelligence backdoor into secret U.S. information
-
-
U.S. wireless landascpe about to change
Clearwire, Sprint Nextel to form $14.55 billion wireless company which will deploy WiMAX networks across the United States; WiMAX’s speed dwarfs current wireless technologies, holding the potential of rendering cable and phone line Internet obsolete
-
-
Malicious hardware may be next hacker tool
Next threat on the computer security front: Malicious hardware; malicious hardware is more problematic because it is more difficult to detect; China is already using an early, and simple, version of malicious hardware in its massive military and industrial espionage campaign against Western countries and companies
-
-
Cybersecurity agenda for the next president
Cybersecurity is not a technical issue, but a matter of culture, education, and self-interest; government cannot regulate information technology security, and industry cannot do the job by itself
-
-
Security companies criticize Defcon virus contest
Hackers’ event, Defcon, will hold a contest to see who can develop the best virus to beat antivirus software; prizes range from “Most elegant obfuscation” to “Most deserving of beer”; antivirus vendors upset
-
-
U.K. government split over mobile threat
U.K. agencies divided over the scope and imminence of wireless systems which control the nation’s critical infrastructure
-
-
The Harris RF-1033M
Land Mobile Radio for direct, secure multi-agency communications across multiple frequency bands
-
-
What Is Keeping Your COO Awake at Night?
An HSDW conversation on Cybersecurity with Tim Kelleher, vice president of enterprise security, Unisys
-
-
BAE Systems and communication interoperability
BAE’s First InterComm device, also called the Vehicle Communications Assembly (VCA), is small enough (8.625” x 8.625” x 2.5”) to be easily mounted inside first responder vehicles; once installed, the VCA relies on vehicle power
-
-
U.K. faces wave of data security breaches
The state of personal data security in the United Kingdom is not good; in the last six months, nearly 100 incidents of data security breaches by government agencies and private sector companies were reported
-
-
China may have back door into U.S. military computer networks
A technological sleeper cell: The Chinese have manufactured counterfeit Cisco routers and switches and offered them at exceedingly low prices; U.S. vendors upgrading or replacing U.S. government IT systems used these counterfeit devices — and the FBI and other government agencies are now worried that the gear offers the Chinese undetectable back-doors into highly secure government and military computer system; the FBI investigates
-
-
Wireless cyber security center opened
Lockheed Martin opens lab which will allow defense and intelligence agencies to test systems like 802.11 Wi-Fi or broadband satellite links on a Top Secret / Sensitive Compartmented Information (TS/SCI) network
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.