-
Estonia accuses Russia of botnet attacks
Former Soviet republic reports that Russian government computers are the source of a wave of botnet attacks; a dispute over a WWII monument heats up
-
-
Verizon signs deal to buy Cybertrust
Agreement is seen a “competitive coup” against the managed security industry; Verizon will also acquire certification firm ICSA Labs
-
-
Democrats wonder about possible cyber attack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
SafeNet to make its IP avaliable on chipestimate.com
Network chip developers will be glad to see that SafeNet will allow centralized access to information about the its silicon IP security solutions at chipestimate.com
-
-
Experts express concern about REAL-ID security
National database could be a prime target for hackers; Smart Card Alliance modestly recommends smart cards as alterantive to bar codes
-
-
Debate over 700 MHz intensifies
Communication problems during 9/11 and Katrina have prompted calls for dedicating a portion of the 700 MHz spectrum for public-sfatey use; commercial interest have other ideas, and the FCC is caught in the middle
-
-
L-1 buys Maryland's Advanced Concepts
Robert LaPenta moves forward with the second phase of his acquisition strategy; network security and engineering firm expected to widen federal market access
-
-
$100 laptop for developing world poses IT security concerns
Mesh network system could turn a small African village into the largest botnet in the world; program’s enemies aim at the “$100 brick”
-
-
DHS plans back-up cross-agency data center
Worries about the Eastern Interconnect prompt DHS to build a mirror site in the west; contracts to be awarded this summer
-
-
Gonzales ignores critics, focuses on identity theft
Attorney General proposes a national information sharing system; presidential task force suggests national standards
-
-
Radio used to hack computer screens
An updated version of Van Eck Phreaking finds laptops vulnerable to this disturbing hacking technique
-
-
Enterprise VoIP Primer: The Secure Investment // by Daniel Zubairi, CISSP
VoIP offers many advantages to the organizations deploying them, but the technology also brings with it vulnerabilities that must be addressed
-
-
GD wins $6 biillion IWN contract
GD leads a team of IT heavyweights to build a nationwide interoperable wireless network linking the Justice, Homeland Security, and Treasury departments
-
-
Los Alamos cybersecurity focus of congressional hearing
The names of 550 Los Alamos employees were posted on the Web site of a former subcontractor; the information was gathered for a badge reader which was never used
-
-
HP adds security to network management package
HP adds two security applications to popular network management suite — and emphasizes adding security on the edge
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.