-
FBI investigates Unisys's responsibility for DHS security breaches
Chinese cyber-attackers compromised DHS computers during the summer and fall of 2006; these computers were supposed to be secured by Unisys in 2002 $1 billion contract; FBI investigates breaches and alleged cover-up
-
-
EU plan to block access to bomb-making Web sites faces technical hurdles
The EU wants to make it more difficult for would-be terrorists to gain knowledge on bomb-making, but blocking access to Web sites where such knowledge is offered is not easy
-
-
Network security to move toward "complete packet inspection"
The new approach will embed security in a pervasive manner throughout the entire network to provide the situational awareness necessary to respond instantly to threats or problems and contain the damage before it spreads into the entire network
-
-
Verizon extends DOS service to Asia
Denial of Serivce (DOS) is a popular form of cyberattacks directed at companies; Ceirzon already offered U.S. and European companies an enhanced DoS protection service, and it now extends the service to Asia
-
-
Massive IT security breach in Connecticut
Accenture operates CORE-CT, which performs all of Connecticut’s payroll, personnel, purchasing, accounting, inventory, and other functions; it took a copy of the program to demo in Ohio — and the copy was stolen
-
-
PC users face increasingly complex and dangerous cyber threats
Authrotative cyber threat report says that targeted identity theft, emerging risks associated with online gaming, a doubling of malware exploits, and new software vulnerabilities are but some of the many problems PC users will face in the coming months
-
-
Mumbai police install tracking software in city's cyber cafes
Mumbai is India’s hi-tech hub, and the city police will now have access to new software monitoring activity in the more than 500 cyber cafes in the city
-
-
Growing worries, debates about likelihhod, effects of strategic cyber attack
The spring cyber attacks on Estonia offer an illustration of what strategic cyber warfare may look like; experts debate capabilities, motives for such an attack
-
-
First case of P2P-based identity theft unfolds in Seattle
People have been prosecuted for using peer-to-peer networks illegally to share or obtain copyrighted music, movies, and software, but this is the first prosecution of a P2P-based identity theft
-
-
Chinese military hacked into Pentagon
China improves its cyber warfare capabilities; massive penetration of Pentagon computers in June — and Chinese easy penetration of the networks of defense contactors and think-tanks would allow China not only to gather information, but also disrupt operations
-
-
Mobile torrents are a cell phone security nightmare
Mobile torrents represent incredible access to mobile applications and other content, but for mobile security providers mobile torrents will be a security nightmare; for mobile security providers mobile torrents will be a security nightmare
-
-
IT security group concerned over VoIP safety
Leading member of Jericho Forum criticizes the security of VoIP technology after researchers reveal that it was possible to eavesdrop on VoIP conversations
-
-
Federal CISO: No contradiction between mobility and security
The need to prepare for disaster and the growing availability of technology have combined to promote telework — but is there a contradiction between mobility and security? New study says “no”
-
-
Lessons of Estonia: Ten steps to prepare for cyberwar
Two months ago Estonia came under a coordinated cyber attack; experts say the attack — and Estonia’s response — tell us how IT executives can prepare for the worst
-
-
Corporations demand enhanced cybersecurity
Chief information security officers want the high-tech industry to offer better security tools for their companies; these CISO have formed the Jericho Forum better to advance their case
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.