-
$100 laptop for developing world poses IT security concerns
Mesh network system could turn a small African village into the largest botnet in the world; program’s enemies aim at the “$100 brick”
-
-
DHS plans back-up cross-agency data center
Worries about the Eastern Interconnect prompt DHS to build a mirror site in the west; contracts to be awarded this summer
-
-
Gonzales ignores critics, focuses on identity theft
Attorney General proposes a national information sharing system; presidential task force suggests national standards
-
-
Radio used to hack computer screens
An updated version of Van Eck Phreaking finds laptops vulnerable to this disturbing hacking technique
-
-
Enterprise VoIP Primer: The Secure Investment // by Daniel Zubairi, CISSP
VoIP offers many advantages to the organizations deploying them, but the technology also brings with it vulnerabilities that must be addressed
-
-
GD wins $6 biillion IWN contract
GD leads a team of IT heavyweights to build a nationwide interoperable wireless network linking the Justice, Homeland Security, and Treasury departments
-
-
Los Alamos cybersecurity focus of congressional hearing
The names of 550 Los Alamos employees were posted on the Web site of a former subcontractor; the information was gathered for a badge reader which was never used
-
-
HP adds security to network management package
HP adds two security applications to popular network management suite — and emphasizes adding security on the edge
-
-
Canada emergency response system requires CPR
So says a review of the recent Cyber Storm exercise; poor communications and data access cited as major concerns
-
-
ITSCC, ITGCC to coordinate their activities more closely
A group represneting companies active in the IT sector and an assoication of government departments and agencies relying on the services ofthese comoanies, will coordinate their activities more closely
-
-
Army considers creating a cyber command
Move would follow a recent Air Force decision to do the same; Army pays a visit to Barksdale Air Force Base to explore options
-
-
DoE inspector general raps agency's computer management system
Twenty desktop computers containing classified information are missing; another seventy-four lacked proper labeling
-
-
Army considers creating a cyber command
Move would follow a recent Air Force decision to do the same; Army pays a visit to Barksdale Air Force Base to explore options
-
-
Information Security announces IT Readers' Choice awards
Joint project with SearchSecurity.com recognizes forty-five industry leaders of today and tomorrow
-
-
Hacker gang warfare on the rise
Bot herders fight one another for market share; Storm worm instructed computers to attack the wily Warezov gang
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.