-
Cyberweapon blowback
The real concern about Stuxnet is that its existence demonstrates what is achievable; security analysts are confident that they can stop anything that is a variant of Stuxnet, but the real challenge is stopping something in the style of Stuxnet; this is where the confidence ends
-
-
zvelo reaches 100 OEM milestone
Pivotal milestone attributed to strong adoption of zvelo’s URL database, website categorization and malicious website detection solutions for a vast array of applications
-
-
Including ads in mobile apps poses privacy, security risks
Researchers have found that including ads in mobile applications (apps) poses privacy and security risks; in a recent study of 100,000 apps in the official Google Play market, researchers noticed that more than half contained so-called ad libraries, and that many of the apps included aggressive ad libraries that were enabled to download and run code from remote servers, which raises significant privacy and security concerns
-
-
Triple-threat computer protection reduces identity theft
Having a triple-threat combination of protective software on your computer greatly reduces your chances of identity theft; computer users who were running antivirus, anti-adware, and anti-spyware software were 50 percent less likely to have their credit card information stolen
-
-
U.K. holds amateur cybersecurity challenge to spur interest in field
For the past several weeks amateur cybersecurity experts have been searchingfor malware, defending against cyberattacks, and raising firewalls as part of Britain’s Cyber Security Challenge
-
-
NATO commander target of persistent Facebook cyberattacks
The senior commander of NATO has been the target of repeated Facebook-based cyberattacks that are believed to have originated from China; Admiral James Stavridis is the subject of a campaign to gain information about him and his colleagues, friends, and family
-
-
Cambridge first year student wins U.K. Cybersecrity Challenge competition
Cyber Security Challenge U.K. announces a winner and unveils this year’s new Challenge program (open for registrations as of yesterday); the winner, Jonathan Millican, competed with thousands of registered candidates in 6-month competition
-
-
NYC cyberattack simulation to spur Senate cybersecurity legislation
Last Wednesday, in an attempt to bolster support for cybersecurity legislation, the White House staged a mock cyberattack on New York City’s power supply for the Senate
-
-
NASA official says hackers gained “full functional control”
Last week NASA officials disclosed details about the alarming extent that hackers were able to penetrate the agency’s networks
-
-
Top LulzSec hackers arrested, leader turns them in
In the ongoing battle between law enforcement officials and hackers, authorities announced on Tuesday that they had arrested leading members of the hacktivist group known as LulzSec after their leader allegedly turned them in
-
-
Anonymous retaliates, takes down Interpol site
In retaliation for the arrest of twenty-five suspected members of the hacktivist collective known as Anonymous, the group briefly took down Interpol’s website on Tuesday
-
-
Cryptographic attack shows importance of bug-free software
Researchers have developed an attack that can circumvent the security OpenSSL should provide; the attack worked on a very specific version of the OpenSSL software, and only when a specific set of options were used
-
-
Cybersecurity firm discovers mutant computer viruses
Cybersecurity firm BitDefender recently announced that it had uncovered multiple instances of computer viruses infecting other viruses to create “Frankenware”
-
-
DHS to work with Netherlands on cybersecurity
On Wednesday DHS Secretary Janet Napolitano signed a letter of intent to work with the Netherlands on several critical cybersecurity initiatives
-
-
Cell phone hackers can track your location without your knowledge
Using a cheap phone, readily available equipment, and no direct help from a service provider, hackers could listen to unencrypted broadcast messages from cell phone towers
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.