-
Congressional approval of cybersecurity bill looks promising
Amid the partisan acrimony of the budget battles on Capitol Hill, the Obama administration and the Senate have made promising efforts to pass a sweeping cybersecurity bill in a rare show of bipartisan agreement; the bill is now at the top of the Senate’s agenda, and Senator Harry Reid (D – Nevada), the majority leader, said he plans to bring the bill to the floor during the first working session of 2012
-
-
Some smartphones are more vulnerable to attack
New research shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making these phones more vulnerable to attack
-
-
U.K. unveils new cyber defense strategy
The U.K. government last week published its new Cyber Security Strategy; the government said the new strategy sets out “how the United Kingdom will support economic prosperity, protect national security, and safeguard the public’s way of life”
-
-
Anonymous retaliates against cyber investigators
The international hacktivist group known as Anonymous recently released two large torrents of stolen government data including details on forensic methodologies and information regarding current and former law enforcement agency employees; the latest attacks come in retaliation to harsh sentences given to members of its group
-
-
U.K. banks pass cyberdefense stress test
To bolster cyberdefenses in the financial industry, U.K. banks recently took part in a stress test to determine their ability to cope with a cyberattack; eighty-seven banks took participated in the drill including Barclays, HSBC, and Royal Bank of Scotland
-
-
Hackers fail in AT&T cyberattack
Last week AT&T announced that it had successfully fended off an attack by hackers; the company said it is still unclear what the hackers’ intentions were, but no accounts were breached
-
-
The 25 worst passwords of 2011
SplashData, a password management application provider, has released its annual list of the worst Internet passwords. The list was prepared from files containing millions of stolen passwords posted online by hackers. The worst password of 2011: “password.”
-
-
Nations could cripple U.S. with retaliatory cyberattack
Last week Richard Clarke, a top adviser to three presidents, sounded a dire warning that the United States should avoid going to war with other nations because its computer networks systems are so vulnerable to attack
-
-
Detecting insider threat from massive data sets
Researchers in a 2-year, $9 million project will create a suite of algorithms that can detect multiple types of insider threats by analyzing massive amounts of data — including email, text messages and file transfers — for unusual activity
-
-
Fewer but costlier cases of identity theft in U.S.
Identity fraud in the United States fell 28 percent in 2010 to 8.1 million from an estimated 11 million in 2009, according to Javelin Strategy &Research. The problem: thieves are becoming more creative in their methods of obtaining personal information, and those who suffer from identity theft are facing higher consequences, with the average out-of-pocket costs nearly doubling in the same time period to $631from $387 per incident.
-
-
Chemical industry hit by “Nitro” cyberattacks
In a string of cyberattacks, hackers have stolen critical formulas and plans from major chemical companies; the latest attacks, dubbed “Nitro,” were uncovered by Symanetec, which reported the hackers aims were corporate espionage rather than a terrorist attempt to procure chemicals
-
-
Americans anxious about identity theft
Americans will go to great lengths to avoid identity theft, and many say they would take legal action against government or private organizations that compromise their personal data; more than half of surveyed Americans are willing to provide biometric data to secure their identities
-
-
CSAW winners to be announced Friday
Cyber security is capturing the attention of a growing number of high school students, judging by the record participation in Polytechnic Institute of New York University’s annual Cyber Security Awareness Week (CSAW) challenges; the competition will culminate this Friday, 11 November, with thirteen finalists vying for scholarships and cash prizes for their schools’ science programs
-
-
Making counter-hacking cool
NYU-Poly will, for the first time, open cyber security awareness week events on 11-12 November to student guests interested in digital privacy and security — not just the so-called “cyber ninjas” who qualified as national finalists in feats of digital forensics, ethical hacking, and research; the event is expected to attract up to 400 student finalists, professionals, academics, and guests
-
-
China and Russia using cyberspies to steal U.S. secrets
A new Congressional report concludes that Chinese and Russian hackers backed by their respective states are stealing U.S. trade and technology secrets to boost their economic development; the report, titled “Foreign Spies Stealing U.S. Economic Secrets in Cyberspace” and written by the Office of the National Counterintelligence Executive, found that foreign hackers can easily gather large quantities of sensitive data without being detected because so much of it is stored on computers
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.