-
A major cyberattack causing widespread harm to national security is imminent: Experts
A new report found that more than 60 percent of the roughly 1,600 computer and Internet experts surveyed on the future of cyberattacks believe a nationwide cyberattack is imminent. They did so in response to the question: “By 2025, will a major cyberattack have caused widespread harm to a nation’s security and capacity to defend itself and its people?” The experts also warn about the risks to privacy which will accompany a growing focus on cybersecurity.
-
-
Identifying ways to improve smartphone security
What information is beaming from your mobile phone over various computer networks this very second without you being aware of it? Experts say your contact lists, e-mail messages, surfed Web pages, browsing histories, usage patterns, online purchase records and even password protected accounts may all be sharing data with intrusive and sometimes malicious applications, and you may have given permission. The apps downloaded to smartphones can potentially track a user’s locations, monitor his or her phone calls and even monitor the messages a user sends and receives — including authentication messages used by online banking and other sites, he says, explaining why unsecured digital data are such a big issue. Assigning risk scores to apps may slow down unwarranted access to personal information.
-
-
New report details Russia’s cyber-espionage activities
Researchers at FireEye, a Silicon Valley-based computer security firm, are connecting the Russian government to cyber espionage efforts around the world. The researchers released a report on Tuesday which says that hackers working for the Russian government have, for seven years now, been hacking into computer networks used by the government of Georgia, other Eastern European governments, and some European security organizations.
-
-
Georgia Tech releases 2015 Emerging Cyber Threats Report
In its latest Emerging Cyber Threats Report, Georgia Tech warns about loss of privacy; abuse of trust between users and machines; attacks against the mobile ecosystem; rogue insiders; and the increasing involvement of cyberspace in nation-state conflicts.
-
-
New smart key software enhances security for homes businesses
Computer scientists and security specialists have created an innovative electronic smart key system that aims to provide a safer and more flexible security system for homes and businesses. eLOQ is a new software system for the creation and management of electronic keys and locks which cannot be copied or picked.
-
-
China steals confidential data on the vulnerabilities of major U.S. dams
The U.S. Army Corps of Engineers’ National Inventory of Dams(NID) contains critical information on the vulnerabilities of the roughly 8,100 major dams in the United States. Between January and April 2013, U.S. intelligence agencies spotted several attempts by China’s People’s Liberation Army (PLA) cyber-espionage unit to access the NID database and steal its contents. On Monday, National Weather Service (NWS) hydrologist Xiafen “Sherry” Chen, 59 was arrested for allegedly breaching the NID security and stealing confidential data on U.S. dam vulnerabilities. The Justice Department has raised the alarm over multiple attempts by China to steal data on U.S. critical infrastructure through individuals with privileged access to confidential databases.
-
-
FBI wants Congress to mandate backdoors in tech devices to facilitate surveillance
In response to announcements by Appleand Googlethat they would make the data customers store on their smartphones and computers more secure and safer from hacking by law enforcement, spies, and identity thieves, FBI director James Comey is asking Congress to order tech companies to build their devices with “backdoors,” making them more accessible to law enforcement agencies.Privacy advocates predict that few in Congress will support Comey’s quest for greater surveillance powers.
-
-
Social media firms pledging to keep users anonymous still collect users’ information
Social media firm Whisperprides itself on offering anonymity in a market where the biggest players are often considered too transparent. Its co-founder, Michael Heyward, a tech entrepreneur, describes the company as “the first completely anonymous social network,” an alternative to Facebookand Twitter. It now emerges that Whisper’s back-end systems that retain digital libraries of texts and photographs sent by users, and in some cases the location information of users.
-
-
Surge in cyberattacks drives growth in cybersecurity insurance
More than 3,000 American businesses were hacked in 2013, many of them small and mid-size firms without cybersecurity insurance. That surge in cyberattacks has led to a growing cybersecurity industry, with firms offering products and solutions to secure network systems. Insurance companies are also claiming their stake in the booming industry. Today, roughly fifty U.S. companies offer cybersecurity insurance. American businesses will spend up to $2 billion on cyber-insurance premiums this year, a 67 percent increase from the $1.2 billion spent in 2013.
-
-
U.S. should emulate allies in pushing for public-private cybersecurity collaboration
Israeli Prime Minister Benjamin Netanyahu announced last month the formation of a national cyber defense authority to defend civilian networks under the leadership of the Israel National Cyber Bureau.The “U.S. government has a lot to learn from successful examples in allied nations. With more compromise and reform, there is plenty of reason for hope,” says a cybersecurity expert, adding that “a cybersecurity partnership between government, business, and individuals built on trust is possible, and would promote more resilient networks as well as creative thinking on cybersecurity.”
-
-
State, local governments aim to strengthen cybersecurity staff despite shrinking budgets
Due to increased cyberattacks on state and local government servers, many leaders are looking to strengthen the cybersecurity staff on their payrolls. Lower levels of government are also worried about cybercrime due to the large amounts of personal and confidential data that they store. Demand for cybersecurity experts is more than double the workplace demand for IT specialists.
-
-
New Web privacy system would revolutionize surfing safety
Scientists have built a new system that protects Internet users’ privacy while increasing the flexibility for Web developers to build Web applications that combine data from different Web sites, dramatically improving the safety of surfing the Web. The system, “Confinement with Origin Web Labels,” or COWL, works with Mozilla’s Firefox and the open-source version of Google’s Chrome Web browsers and prevents malicious code in a Web site from leaking sensitive information to unauthorized parties, while allowing code in a Web site to display content drawn from multiple Web sites — an essential function for modern, feature-rich Web applications.
-
-
New cyber initiative to put Israel’s Beer-Sheva region on the world’s cyber map
Ben-Gurion University of the Negev is a central component of the new CyberSpark initiative, an ecosystem with all the components which will allow it to attain a position of global leadership in the cyber field. The CyberSpark initiative is the only complex of its type in the world – a government-academic-industry partnership which includes Fortune 500 companies and cyber-incubators, academic researchers and educational facilities, as well as national government and security agencies. The CyberSpark Industry Initiative will serve as a coordinating body for joint cyber industry activities with government agencies, the Israel Defense Force (IDF), and academia.
-
-
$3 million in grants for three pilot projects to improve online security, privacy
The National Institute of Standards and Technology (NIST) the other day announced nearly $3 million in grants that will support projects for online identity protection to improve privacy, security and convenience. The three recipients of the National Strategy for Trusted Identities in Cyberspace (NSTIC) grants will pilot solutions that make it easier to use mobile devices instead of passwords for online authentication, minimize loss from fraud and improve access to state services.
-
-
New approach to computer security: Wrist-bracelet
In a big step for securing critical information systems, such as medical records in clinical settings, researchers have created a new approach to computer security that authenticates users continuously while they are using a terminal and automatically logs them out when they leave or when someone else steps in to use their terminal. The approach, called Zero-Effort Bilateral Recurring Authentication, or ZEBRA, requires the user to wear a bracelet with a built-in accelerometer, gyroscope, and radio on his or her dominant wrist; such bracelets are commonly sold as fitness devices. When the user interacts with a computer terminal, the bracelet records the wrist movement, processes it, and sends it to the terminal.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.