-
Sourcefire expands westward
Maryland-based Sourcefire acquires Palo Alto-based Immunet for $21 million, expanding the company’s cybersecurity services; the acquisition will allow Sourcefire to accelerate its cloud-based initiative and provide a platform to expand its security services
-
-
China makes Skype illegal
China announced that it had made illegal the use of Skype, the popular internet telephony service, as the country continues to shut itself off from the rest of the world
-
-
U.S. federal investment in cybersecurity to reach $13.3 billion by 2015
U.S. federal investment in information security will rise from $8.6 billion in 2010 to $13.3 billion by 2015 at a compound annual growth rate of 9.1 percent, nearly twice the rate of overall federal IT spending
-
-
The reason for Intel's acquisition of McAfee
The merger between the two companies takes place ahead of the release in 2011 of new — and as yet undisclosed — products developed by a joint venture the two companies have operated in the past eighteen months; those undisclosed products may be part of the reason why Intel decided to purchase McAfee instead of extending or expanding the two companies’ joint venture; says one analyst: “If what came out of that joint venture was revolutionary it could be that Intel wanted to lock that [intellectual property] down”
-
-
Hacker built, and demonstrated, a $1,500 cell-phone tapping device
Security researcher demonstrated a device, which he built for just $1,500, which can intercept some kinds of cell phone calls and record everything that is said; the attack illustrates weaknesses in GSM, one of the world’s most widely used cellular communications technologies
-
-
ATMs easily compromised by hacker at Black Hat
A disturbingly high percentage of the world’s automated teller machines (ATMs) are vulnerable to physical and remote attacks that can steal administrative passwords and personal identification numbers, to say nothing of cash
-
-
IG: computer systems connected to DHS network are not secure
DHS IG reports that DHS has failed to validate the security of computer systems that connect to the primary network, introducing vulnerabilities and putting sensitive information at risk; specifically, the IG detected vulnerabilities in systems connecting to the main department network from Customs and Border Control (CBP); Immigration and Customs Enforcement (ICE); and the Science and Technology Directorate (S&T), including missing security patches, weak passwords, and a lack of access controls that prevent unauthorized users from opening sensitive applications
-
-
CIA bolstering cyber war capabilities
The CIA is increasing its cybersecurity budget by tens of million of dollars; investments in technology focused on defensive systems to prevent cyber threats, as well as offensive capabilities to launch cyber attacks and collect cyber intelligence
-
-
Cybersecurity summit pays little attention to control system's security
Despite threats of infrastructure attacks, scant attention was paid to control systems during a global security conference; the problem is safeguarding infrastructure’s control systems against attackers is that such protection requires a different approach to securing PCs or networks; Windows-based security products will not help; says one expert: “All the devices that sense things — temperature, pressure, flow, and things like that — are not Windows, those are proprietary, real-time or embedded, and there’s no security there”
-
-
Top 10 information security trends for 2010
Further adoption of cloud, social media, and virtualization technologies will continue to blur the network parameter; organizations — large and small — should consider a layered, centralized security solution that provides multiple security touch points within the network, rather than around it
-
-
U.S. Army funds a new discipline: Network Science
The U.S. Army gives Rensselaer Polytechnic in New York State $16.75 million to launch the Center for Social and Cognitive Networks; the new center will link together top social scientists, neuroscientists, and cognitive scientists with leading physicists, computer scientists, mathematicians, and engineers in the search to uncover, model, understand, and foresee the complex social interactions that take place in today’s society
-
-
Raytheon-led team to provide the Pentagon with network-security early warning system
A team including Raytheon, General Dynamics, SAIC, Eye Street Software, and BCMC receives a $28 million contract to provide the Pentagon with an early-warning system for defense against cyber attacks on military networks
-