-
Air Force assesses cyber vulnerability
The more organizations become dependend on communication networks, the more they must ensure that these networks do not themselves become vulnerable to enemy attacks; this is what the U.S. Air Force is now doing
-
-
GAO says FBI's critical networks vulnerable to misuse
The FBI has made important strides since 2002 in securing its networks; the GAO says that sensitive and critical information transmitted on these networks is still not secure
-
-
Democrats wonder about possible cyberattack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
Estonia accuses Russia of botnet attacks
Former Soviet republic reports that Russian government computers are the source of a wave of botnet attacks; a dispute over a WWII monument heats up
-
-
Verizon signs deal to buy Cybertrust
Agreement is seen a “competitive coup” against the managed security industry; Verizon will also acquire certification firm ICSA Labs
-
-
Democrats wonder about possible cyber attack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
SafeNet to make its IP avaliable on chipestimate.com
Network chip developers will be glad to see that SafeNet will allow centralized access to information about the its silicon IP security solutions at chipestimate.com
-
-
Experts express concern about REAL-ID security
National database could be a prime target for hackers; Smart Card Alliance modestly recommends smart cards as alterantive to bar codes
-
-
Debate over 700 MHz intensifies
Communication problems during 9/11 and Katrina have prompted calls for dedicating a portion of the 700 MHz spectrum for public-sfatey use; commercial interest have other ideas, and the FCC is caught in the middle
-
-
L-1 buys Maryland's Advanced Concepts
Robert LaPenta moves forward with the second phase of his acquisition strategy; network security and engineering firm expected to widen federal market access
-
-
$100 laptop for developing world poses IT security concerns
Mesh network system could turn a small African village into the largest botnet in the world; program’s enemies aim at the “$100 brick”
-
-
DHS plans back-up cross-agency data center
Worries about the Eastern Interconnect prompt DHS to build a mirror site in the west; contracts to be awarded this summer
-
-
Gonzales ignores critics, focuses on identity theft
Attorney General proposes a national information sharing system; presidential task force suggests national standards
-
-
Radio used to hack computer screens
An updated version of Van Eck Phreaking finds laptops vulnerable to this disturbing hacking technique
-
-
Enterprise VoIP Primer: The Secure Investment // by Daniel Zubairi, CISSP
VoIP offers many advantages to the organizations deploying them, but the technology also brings with it vulnerabilities that must be addressed
-
More headlines
The long view
What Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?
While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.
Confronting Core Problems in Cybersecurity
It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul —a testament to how disruptive these attacks have become.
Voting from Your Sofa Is Secure Enough – but Will It Be Allowed?
A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.