-
Killing Internet worms dead
Internet worms flood the Internet with junk traffic, and at their most benign, they overload computer networks and shut them down; Buckeyes researchers find new way to combat worms
-
-
Green protection against terrorist attacks
Here is a solution which combines responses to two great concerns of the time: terrorism and the environment; Georgia company offers an environmentally friendly anti-terrorist vehicle barrier
-
-
Glaring gaps in network security, II
Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks
-
-
Chinese hacking threatens U.S. critical infrastructure
U.S. government networks, and the computer systems of U.S. and Western European companies, are under broad and systemic Chinese hacking campaign; in the case of private Western companies, China steals industrial secrets and patent information in order to hasten its rise to a position of global economic hegemony; in the case of U.S. critical infrastructure — for example, control of electric power stations, several of which Chinese hackers have managed to disable — China may be preparing for more sinister contingencies
-
-
Glaring gaps in network security, I
Specialists in penetration testing take six hours to hack the FBI; hacking the networks of Fortune 500 companies takes much less time; even companies which have been Sarbanes-Oxley compliant for several years have been hacked within twenty minutes, with the hackers taking control of the business; these hackers proved they could actively change general ledgers and do other critical tasks
-
-
Is the Internet "Critical Infrastructure"?
The Internet’s architecture is optimized to be cheap and ubiquitous; such a network is never going to be perfectly secure or reliable; transactions that absolutely have to be done correctly and on time need to be done on a dedicated network
-
-
Nigerian group threatens attacks
Today is the one-year anniversary since Umaru Yar’Adua was inaugurated as president of Nigeria; MEND, the leading rebel group in the Niger Delta, said yesterday that it would launch a series of bombings against oil installations to mark the day
-
-
Grasshopper robot breaks high-jump record
Researchers develop small - very small: it is 5 centimeters tall and weighs just 7 grams — hopping robot; swarms of such hopping robots could spread out to explore disaster areas, or even the surfaces of other planets
-
-
Power plants open to hacker attack
Power plants, dams, and many other critical infrastructure assets are controlled by a system called supervisory control and data acquisition, or SCADA; a Boston technology specialist finds serious vulnerability in the system
-
-
Civilian nuclear facilities in Sichuan confirmed safe
The Chinese government has identified 32 radioactive sources in the earthquake-devastated Sichuan area - hospitals, research centers, factories, but no power plants; 30 sources have already been located and removed; the two remaining sources have been cordoned off and are being excavated
-
-
Chinese lakes may burst
Last Monday’s earthquake, and subsequent aftershocks, weaken large dam and raise fears of man-made lake bursting, causing massive floods in the already ravaged region
-
-
DHS awards $844 million to secure U.S. critical infrastructure
DHS awards millions to bolster security fo rail, truck, and bus transportation; department says awards are strictly risk-based
-
-
An HSDW conversation with John Stroia, vice president, Government Security and Monitoring Solutions, Diebold
Diebold has been adding “layers of protection” to its customers since 1859; Diebold provides one-stop shopping for technology-based electronic systems, software, and services, and the company is active in all four major security markets: financial; commercial (retail); enterprise (large corporations); and government
-
-
NATO to help Estonia’s cyber defense
Last year Estonia became the first nation to suffer a systematic, sustained cyber attack that brought the Baltic nation’s infrastructure to halt; Russian nationalists, and probably agencies of the Russian government, were implicated in the attack; NATO wants to help
-
-
China lacks earthquake early-warning system
Earthquake alerts are still in their infancy and few nations deploy them; China is one of the many countries which is yet to do so; such systems offer but a few seconds warning of a coming quake, but these few seconds may be enough to save many from death or injury
-