• More than 4 million credit, debit cards exposed in security breach

    Supermarket chain Hannaford Bros., with 270 stores nationwide, says that a security breach in its system exposed 4.2 million credit and debit cards; 1,800 cases of fraudulent use already detected

  • Serious RFID vulnerability discovered

    A group of a Dutch university’s digital security researchers discovers a major security flaw in a popular RFID tag; discovery can have serious commercial and national security implications; as important as the discovery itself was how the researchers handled the situation

  • MI5 seeks powers to trawl records in new terror hunt

    As part of the Brown government’s new counterterrorism strategy, which places emphasis on thwarting a cyber-attack on the United Kingdom, MI5 seeks total access to commuters’ travel records to help them meet the threat

  • Age-old communication problem solved using quantum entanglement

    One of the major problems in communication is known as the Byzantine agreement: Messages between three different parties are subject to faulty information; researchers succeeded in overcoming the qutrit difficulties by setting up a system that creates four-qubit entangled states

  • Economic barriers to better IT security

    In the real world, investment in risk avoidance may not be profitable; establishing economic incentives for IT suppliers to produce more secure products is a major problem because software publishers are not held liable for the shortcomings of their products; a new paper examines this conundrum

  • U.S. officials: "Cyber Warfare Is Already Here"

    U.S. officials say China, Russia, and possibly other nation-states are capable of collecting or exploiting data held on U.S. information systems; Director of National Intelligence says especially worrisome is the ability of other countries to destroy data in the system: “And the destroying data could be something like money supply, electric power distribution, transportation sequencing and that sort of thing”

  • New consortium to develop safety critical software

    High Integrity and Safety Critical Software (HI&SCS) is “the critical enabling technology” (U.K. Ministry of Defense’s words) for modern defense platforms, network enabled capability, and complex infrastructure; York University to lead a industry-academia consortium to develop such software; consortium will emulate the U.S. Software Engineering Institute

  • Breakthrough: Transcribing entanglement into and out of quantum memory

    Caltech researchers demonstrate for the first time an important capability required for the control of quantum information and quantum networks: Coherent conversion of photonic entanglement into and out of separated quantum memories

  • U.S., U.K. military secrets e-mailed to factory hand

    English factory hand bought a domain name which resembled the domain name of neighboring RAF base; for the last few years he has been receiving thousands of classified and highly sensitive e-mails from the U.S. Air Force — including the flight plan of Air Force One during President Bush’s visit to the U.K.; efforts to have the RAF or USAF address the problem failed; domain finally shut down last week

  • U.K. government lost more than 1,000 laptops in recent years

    The worries about how the U.K. government protects sensitive data continue: A report to parliament admits that the government has lost or had stolen more than 1,000 laptops in recent years

  • iRobot brings robotic WLAN to urban battlefield

    Everything you want a robot to be: Portable, small, inexpensive, intelligent, and robust; iRobot will develop robots to serve as relay node for urban battle-field WLAN

  • Banking security measures can tackle terrorism and terrorist financing

    Mobile phones can be part of the banks’ security to prevent terrorist financing through fraud, but it can also be a direct tool in the pursuit of homeland security

  • More than $3 billion lost in 2007 in phishing attacks

    New survey shows the 3.6 million U.S. adults lost an average $886 each to phishing schemes, totaling in $3.2 billion loss; the good news: More victims were able to recover some of their losses relative to previous years; phishing and malware attacks will continue to increase through 2009 because it is still a lucrative business for the perpetrators

  • How to protect corporate secrets from outsiders -- and insiders

    A secret can be lost in the blink of an eye, but getting information back under wraps can take forever; John Edwards offers a few useful tips on how corporations can become more secure

  • Researchers: Computers' "secure" memory systems utterly insecure

    Attacks on computer memory reveals vulnerability of widely used security systems; information stored in a computer’s permanent memory readily accessible to hackers; laptops especially vulnerable