-
Kaminsky: MS Crash Analyzer a "game changer"
Microsoft released an open-source program designed to streamline the labor-intensive process of identifying security vulnerabilities in software while it is still under development
-
-
Political denial-of-service attacks on the rise
The cases of Estonia in 2007 and Georgia in 2008 illustrate how dedicated denial-of-service attacks can nearly paralyze a country; trouble is, now attackers can purchase tools such as Black Energy or NetBot Attacker, made by Russian and Chinese hackers, respectively, for less than $100 a piece
-
-
Experts: Russian intelligence behind cyber attacks
A panel of IT security experts concluded that there is a “strong likelihood” that the Foreign Military Intelligence agency (the GRU) and Federal Security Service (the FSB) directed cyber attacks on Georgian government servers in July and August of 2008
-
-
Smart Grid vulnerable to hackers
Smart Grid may be more efficient and economical as a power distribution system, but how safe is it? Security experts say it is not safe, and that until vulnerabilities are addressed, implementation should proceed slowly
-
-
Critic: U.K. fraud strategy "more worthy of Uzbekistan"
Business fraud costs Britain £14 billion a year; the U.K. government today launched its National Fraud Strategy, but a Cambridge professor harshly criticizes the initiative
-
-
Leading browsers easily felled at hacker contest
Students at a hacker convention easily breach the protections built into Safari, IE 8, and Firefox; contestants do so in front of appreciative spectators and in a matter of hours
-
-
CSC to help combat cyber warfare
Cyberattacks pose a major threat to the welfare and security of developing countries; developing protection against that threat offers business opportunities
-
-
Cyber criminals already using March Madness for their scams
March Madness begins at the end of this week, but cyber criminals are already exploiting the popular college basketball event for their nefarious purposes
-
-
Yoran: Better metrics needed for security
Amit Yoran says that the security industry is awash in bad data, and that companies that attempt to use the metrics could take the wrong actions
-
-
UNC students win cyber defense competition
University of North Carolina students win, for the second time in four years, the DHS-sponsored Southeastern Region Collegiate Cyber Defense Competition
-
-
New York City is especially vulnerable to rise in sea level
Although low-lying Florida and Western Europe are often considered the most vulnerable to sea level changes, the northeast U.S. coast is particularly vulnerable because the Atlantic meridional overturning circulation (AMOC) is susceptible to global warming
-
-
Handling nuclear materials for less
During this century, nuclear plant decommissioning in the United Kingdom will likely produce thousands of waste packages that will be retrieved, conditioned, and stored for no less than £40 billion; BNS develops new way to reduce storage and handling costs of radioactive material
-
-
U.S. searching for a nuclear waste graveyard
Congress has killed the Yucca Mountain nuclear repository project, so the United States has no central location for storing nuclear waste; 50,000 metric tons of toxic nuclear waste that has already been produced by the U.S. nuclear plants; 30,000 metric tons more of nuclear waste is expected to be generated in the coming decades
-
-
2007 cyber attack on Estonia launched by Kremlin-backed youth group
Sustained cyber attacks in April and May 2007 on Web sites of the Estonian government paralyzed many government functions and commercial activities; it was the first such sustained attack on a country’s networks
-
-
Critics: Commercially driven deep packet inspection (DPI) is akin to wiretapping
New technology now allows third parties to engage in deep packet inspection (DPI), a technique that makes it possible to peer inside packets of data transmitted across the Internet; data collected is then sold to other companies to allow them more targeted advertising
-
More headlines
The long view
Helping Strengthen America’s Critical Infrastructure
Everyday life depends on a robust infrastructure network that provides access to running water, communications technology and electricity, among other basic necessities. The experts who keep our national infrastructure secure and resilient also need a strong network to share their knowledge and train the next generation of professionals capable of solving complex infrastructure challenges.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.