-
NIST issues revised security controls guide
Making sure information systems are secure is a daunting challenge; NIST’s revised — and hefty — guide would help IT managers cope
-
-
Broadcom acquires GPS specialist Global Locate
Broadcom pays $146 million for GPS specialist with a technology that reduces location identification from minutes to seconds
-
-
Online security experts in legal gray area
Laws hampers the ability of online security experts do their job dilligently and effectively — not a good thing when the use of Web-based applications grows by leaps and bounds
-
-
Quantum encryption: Inherently unbreakable or vulnerbale to hacking?
As debate continues about whether or not quantum encryption is inherently unbreakable, a team of researchers was able to create an encryption key in two locations simultaneously, 144 kilometers apart
-
-
Quantum keys sent over 200-km fiber-optic link
If properly executed, quantum encryption is unbreakable because eavesdropping changes the state of the photons
-
-
Air Force assesses cyber vulnerability
The more organizations become dependend on communication networks, the more they must ensure that these networks do not themselves become vulnerable to enemy attacks; this is what the U.S. Air Force is now doing
-
-
GAO says FBI's critical networks vulnerable to misuse
The FBI has made important strides since 2002 in securing its networks; the GAO says that sensitive and critical information transmitted on these networks is still not secure
-
-
Democrats wonder about possible cyberattack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
Estonia accuses Russia of botnet attacks
Former Soviet republic reports that Russian government computers are the source of a wave of botnet attacks; a dispute over a WWII monument heats up
-
-
Verizon signs deal to buy Cybertrust
Agreement is seen a “competitive coup” against the managed security industry; Verizon will also acquire certification firm ICSA Labs
-
-
Democrats wonder about possible cyber attack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
SafeNet to make its IP avaliable on chipestimate.com
Network chip developers will be glad to see that SafeNet will allow centralized access to information about the its silicon IP security solutions at chipestimate.com
-
-
Experts express concern about REAL-ID security
National database could be a prime target for hackers; Smart Card Alliance modestly recommends smart cards as alterantive to bar codes
-
-
Debate over 700 MHz intensifies
Communication problems during 9/11 and Katrina have prompted calls for dedicating a portion of the 700 MHz spectrum for public-sfatey use; commercial interest have other ideas, and the FCC is caught in the middle
-
-
L-1 buys Maryland's Advanced Concepts
Robert LaPenta moves forward with the second phase of his acquisition strategy; network security and engineering firm expected to widen federal market access
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.