• Securing smartphones in battle

    As the military moves to incorporate smartphones on the battlefield, critics worry that the inherent security flaws in the devices could result in major data breaches or cybersecurity attacks on the military’s networks

  • German police uses backdoor Trojan to monitor Skype calls

    A backdoor Trojan capable of monitoring online activity and recording Skype calls has been detected — and is allegedly being used by the German police force

  • National Cybersecurity Awareness Month launches today

    DHS, in announcing the launching of the eighth annual National Cybersecurity Awareness Month (NCSAM), says that this is why cybersecurity is a shared responsibility, and each of individual and organization has a role to play; “Emerging cyber threats require the engagement of our entire society including government and law enforcement, the private sector, and members of the public,” DHS says in a statement

  • New report highlights Zeus Trojan's enhancement

    New report highlights enhancements of the notorious Zeus Trojan; the enhancements help Zeus undermine tacking and detection aimed at thwarting Zeus

  • Better cloud security

    Researchers have developed a new, experimental technique better to protect sensitive information in cloud computing — without significantly affecting the system’s overall performance

  • GAO: poor security procedures put sensitive government data at risk

    A recently released Government Accountability Office (GAO) report found that poor information security practices at U.S. government agencies have put sensitive data and servers at risk

  • Registration for CyberPatriot IV competition to end this week

    With less than a week left before registration closes, CyberPatriot IV, the National High School Cyber Defense Competition, has more than 850 teams registered; this competition is attracting high school educators across the United States; the structure of the competition provides students hands-on learning while competing virtually against their peers and introduces many to the idea of cyber security as a profession

  • Securing financial infrastructure against cyberattacks

    To protect the U.S. financial sector from increasingly ubiquitous and costly cyberattacks, DHS plans to work more closely with other federal agencies as well as the private sector to defend against hackers

  • Strong growth for mobile phone embedded biometric security solutions

    New study says that the conditions are now right to create a strong market for mobile phone embedded biometric security solutions; the current global user base of four million users in 2011 is set to grow to 39 million users by 2015

  • ISPs asked to help fight hackers

    DHS and the Department of Commerce are considering a proposal that would request assistance from Internet-service providers in combatting computer viruses known as botnets

  • ASIS 2011 -- combating cyber extremists

    At this year’s ASIS International conference, security experts will explore the effect of the Internet on terrorism, how extremist organizations are using it, and what can be done to stop it; the web has largely proven to be a boon to society, but malicious actors like terrorists have used the Internet to disseminate their radical ideas, recruit new members, and share weapons and bomb building training manuals; terrorist websites have proven to be reliable sources for intelligence as well as dangerous meeting places, but shutting them down has proven to be more complicated than anticipated

  • Cyber attacks on U.S. are becoming more lethal

    The head of the U.S. Cyber Command said that cyber attacks on the United States are escalating from large-scale theft and disruption of computer operations to more lethal attacks that destroy systems and physical equipment

  • Report warns U.S. unprepared for cyber attacks

    A new report warns that the United States lacks the capabilities to defend against expanding cyber threats; the report found, “The impact has increased in magnitude, and the potential for catastrophic collapse of a company has grown,” yet the businesses community has failed to understand that

  • Safeguarding the Internet of tomorrow

    The recommendations of a high-level cybersecurity summit held Belfast include developing self-learning, self aware cyber security technologies, protecting smart utility grids, and enhancing the security of mobile networks. The summit concluded that these are among the top research priorities needed to safeguard the Internet of tomorrow

  • Measuring effect of Wi-Fi attacks

    Researchers have developed a way to measure how badly a Wi-Fi network would be disrupted by different types of attacks — a valuable tool for developing new security technologies