-
Eight times more malicious e-mail attachments spammed out in Q3 2008
Sophos reports identity thieves and hackers striking Windows users on all fronts; Russia becomes a more important player in the Dirty Dozen league of spam-relaying nations
-
-
Canadian universities study the two sides of the Internet
Terrorists and hackers use the Internet to spread their nefarious programs; some governments use the Internet to spy on their citizens; Dalhousie is working on a way to spot criminal behavior, while U Toronto keeps censors at bay halfway around the globe
-
-
Energy companies targeted by Web-borne malware
New report says the energy companies experienced more Web-based malware attacks than any other vertical market in the third quarter of this year, with an increased rate of exposure of 189 percent
-
-
New reactor design lessens risk of weapon proliferation
Nuclear materials for power reactors cannot be stolen by those interested in using it for nuclear weapons while the material is in the reactor — it is too hot to handle; the risks of diversion are during the enrichment process, and while the material is being transported; to lessen the risk, researchers offer innovative reactor design
-
-
Businesses to increase IT security budgets
Ernst & Young finds that at least 50 percent of companies are set to increase their IT budgets, the current financial difficulties notwithstanding
-
-
Closed Maine suspension bridge used for anti-terror testing
DHS is using a closed Maine bridge for tests on how to fortify bridges against terrorist attacks
-
-
Report: Private sector can better prepare for cyber attack risks
New expert panel report suggests shifting control of corporate cyber infrastructures from IT departments to chief financial officers
-
-
Using pre-cast abutments to build bridges faster
Wisconsin contractor using pre-cast, segmental abutments for the first time to build a bridge in Wisconsin; technique may allow building bridges 30 percent faster
-
-
New IRS computer systems vulnerable.
The IRS is spending nearly $2 billion on two new systems which would more effectively handle the tax returns filed by $142 million Americans; Treasury IG finds vulnerabilities in both systems which would allow unscrupulous individuals to manipulate tax information — and do so undetected
-
-
GE shows a chemical sensor that does not need batteries
Researchers develop a chemical sensor that can detect minute quantities of chemicals in the air or water; it has no batters: it receives its power wirelessly from a sensor reader
-
-
Spanish mathematicians model submarine avalanches and tsunamis
Mathematicians develop a new model to explain submarine avalanches and certain types of tsunamis.
-
-
FBI worried about increased cyber crime
Head of the FBI cyber division says the number of victims of cyber crime, and the cost of that crime, are increasing; moreover, as many as two dozen countries have taken an “aggressive interest” in penetrating the networks of U.S. companies and government agencies
-
-
Chertoff urges industry to invest in cybersecurity
About 85 percent of the U.S. critical infrastructure is owned and operated by private industry; DHS secretary Chertoff says this fact makes cybersecurity a shared responsibility between government and the corporations that control most computer networks
-
-
U.K. pauses before implementing sweeping surveillance scheme
The U.K. government said it wanted to give law enforcement sweeping power to collect electronic data as a measure to prevent terrorism; the government now says it will engage in consultations to make sure citizens’ privacy is not violated
-
-
GTISC lists major 2009 cyber threats
Georgia Tech Information Security Center releases emerging cyber threats forecast for 2009
-
More headlines
The long view
Helping Strengthen America’s Critical Infrastructure
Everyday life depends on a robust infrastructure network that provides access to running water, communications technology and electricity, among other basic necessities. The experts who keep our national infrastructure secure and resilient also need a strong network to share their knowledge and train the next generation of professionals capable of solving complex infrastructure challenges.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.