• Killing Internet worms dead

    Internet worms flood the Internet with junk traffic, and at their most benign, they overload computer networks and shut them down; Buckeyes researchers find new way to combat worms

  • Green protection against terrorist attacks

    Here is a solution which combines responses to two great concerns of the time: terrorism and the environment; Georgia company offers an environmentally friendly anti-terrorist vehicle barrier

  • Glaring gaps in network security, II

    Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks

  • Chinese hacking threatens U.S. critical infrastructure

    U.S. government networks, and the computer systems of U.S. and Western European companies, are under broad and systemic Chinese hacking campaign; in the case of private Western companies, China steals industrial secrets and patent information in order to hasten its rise to a position of global economic hegemony; in the case of U.S. critical infrastructure — for example, control of electric power stations, several of which Chinese hackers have managed to disable — China may be preparing for more sinister contingencies

  • Glaring gaps in network security, I

    Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks

  • Is the Internet "Critical Infrastructure"?

    The Internet’s architecture is optimized to be cheap and ubiquitous; such a network is never going to be perfectly secure or reliable; transactions that absolutely have to be done correctly and on time need to be done on a dedicated network

  • Nigerian group threatens attacks

    Today is the one-year anniversary since Umaru Yar’Adua was inaugurated as president of Nigeria; MEND, the leading rebel group in the Niger Delta, said yesterday that it would launch a series of bombings against oil installations to mark the day

  • Grasshopper robot breaks high-jump record

    Researchers develop small - very small: it is 5 centimeters tall and weighs just 7 grams — hopping robot; swarms of such hopping robots could spread out to explore disaster areas, or even the surfaces of other planets

  • Power plants open to hacker attack

    Power plants, dams, and many other critical infrastructure assets are controlled by a system called supervisory control and data acquisition, or SCADA; a Boston technology specialist finds serious vulnerability in the system

  • Civilian nuclear facilities in Sichuan confirmed safe

    The Chinese government has identified 32 radioactive sources in the earthquake-devastated Sichuan area - hospitals, research centers, factories, but no power plants; 30 sources have already been located and removed; the two remaining sources have been cordoned off and are being excavated

  • Chinese lakes may burst

    Last Monday’s earthquake, and subsequent aftershocks, weaken large dam and raise fears of man-made lake bursting, causing massive floods in the already ravaged region

  • DHS awards $844 million to secure U.S. critical infrastructure

    DHS awards millions to bolster security fo rail, truck, and bus transportation; department says awards are strictly risk-based

  • An HSDW conversation with John Stroia, vice president, Government Security and Monitoring Solutions, Diebold

    Diebold has been adding “layers of protection” to its customers since 1859; Diebold provides one-stop shopping for technology-based electronic systems, software, and services, and the company is active in all four major security markets: financial; commercial (retail); enterprise (large corporations); and government

  • NATO to help Estonia’s cyber defense

    Last year Estonia became the first nation to suffer a systematic, sustained cyber attack that brought the Baltic nation’s infrastructure to halt; Russian nationalists, and probably agencies of the Russian government, were implicated in the attack; NATO wants to help

  • China lacks earthquake early-warning system

    Earthquake alerts are still in their infancy and few nations deploy them; China is one of the many countries which is yet to do so; such systems offer but a few seconds warning of a coming quake, but these few seconds may be enough to save many from death or injury