-
Android phones more vulnerable to cyber attacks than Apple iPhone
Android smart phones are more susceptible to hacking and viruses than Apple’s iPhone; the Android operating system is open source, allowing hackers to understand the underlying code; Apple iPhone may have a safer operating system, but it is not impervious to attacks; McAfee warns that 2011 will see hackers increasingly target mobile devices like Android phones, iPads, and iPhones
-
-
Quick Heal introduces technology to track laptops
New laptop tracking technology will help Indian police track and locate stolen laptops across the country; Quick Heal, the company offering the technology, also aims to create a centralized database of lost or stolen laptops; the database will be accessible to retailers and consumers
-
-
Obama pushing for Internet ID for Americans
The Obama administration is currently drafting what it is calling the National Strategy for Trusted Identities in Cyberspace, which will give the Commerce Department the authority over a forthcoming cybersecurity effort to create an Internet ID for Americans
-
-
Germany reports "sharp rise" in China-originated cyberattacks
Germany detected a sharp rise in serious cyberattacks in 2010; in the first nine months of 2010 there were some 1,600 such attacks recorded, compared to around 900 for the whole of 2009, plus most likely a considerable number that went undetected; Interior Ministry spokesman: “Germany is a very high-tech country with considerable experience and know-how, so of course others will naturally try to get hold of this knowledge—- China is playing a large role in this”
-
-
Mobile phone forensic tools to reduce hi-tech crimes
Government funded technology center in India is developing a set of mobile forensic tools that will assist the law enforcement agencies in cracking unlawful activities committed using mobile phones; the center is a government agency, and will be able to provide the tools at reasonable cost
-
-
Car immobilizers no longer a problem for car thieves
For sixteen years, car immobilizers have kept car thieves at bay — but that may now be changing; most cars still use either a 40 or 48-bit key, even though the 128-bit AES — which would take too long to crack for car thieves to bother trying — is now considered by security professionals to be a minimum standard
-
-
WikiLeaks episode demonstrates insider security threat
Even the toughest security systems sometimes have a soft center that can be exploited by someone who has passed rigorous screening; the U.S. Defense Department’s Secret Internet Protocol Router Network (SIPRNet), a system of dedicated and encrypted lines and servers set up by the Pentagon in the 1990s globally to transmit material up to and including “secret,” the government’s second-highest level of classified information; in 1993, GAO report estimated more than three million U.S. military and civilian personnel had the clearance to access SIPRNet
-
-
New anti-cybercrime software emulates DNA matching process
The biologically inspired software digitally mimics the DNA matching process used in the real world. The software tracks the sequence of events that follow a hacker’s first access request into a secure network system and creates a “digital fingerprint”
-
-
U.S. Internet hosts are essential for criminal botnets
Cybercrime is often associated with Russia and China, and rightly so — but many of the servers vital to their activities are located elsewhere; facilities provided by Internet companies in the United States and Europe are crucial to these criminal gangs’ activities
-
-
Keystroke biometric solution will protect against hacking
Virginia Tech researchers develop an authentication framework called “Telling Human and Bot Apart” (TUBA), a remote biometrics system based on keystroke-dynamics information; the technology will prevent hackers from using a computer program designed to produce keystroke sequences in order to spoof more conventional security systems
-
-
ID theft costs U.K. £2.7 billion a year
Identity fraud affects 1.8 million Britons every year, costing £2.7 billion in the process; victims can spend up to 200 hours undoing damage
-
-
Chinese hackers steal South Korean defense secrets
Chinese hackers have stolen secrets on South Korea’s defense and foreign affairs by using bogus e-mails claiming to come from Seoul officials and diplomats; similar attacks originating in China-based servers briefly crippled U.S. and South Korean government and commercial Web sites in July 2009
-
-
U.S. considering Aussie Internet security program
The Obama administration is considering adoption of parts of an Internet security scheme which will go into effect in Australia in December; the plan will allow Internet service providers to alert customers if their computers are taken over by hackers — and could limit these customers’ online access if they do not fix the problem
-
-
U.K. security firms say GCHQ's cyberattack warning overwrought
U.K. cybersecurity industry insiders say last week’s warnings by Britain’s cybersecurity chief about the cyber threat the U.K. was facing may have over-hyped threats — and may have been related more to the run-up to the U.K. government’s comprehensive spending review announcement than to new threat information
-
-
Microsoft cleaned 6.5 million zombie PCs during April-June 2010
Microsoft cleaned in excess of 6.5 million zombie computers between April and June 2010, but the company’s efforts alone are not enough to put a stop to the increasing threat that botnets represent to users, businesses and critical infrastructure
-
More headlines
Who's online
There are currently 0 users and 0 guests online.
The long view
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.