-
Personal information of 2.3 million people illegally removed from database
In the third largest data breach this year, an employee steals records of 2.3 million people from company’s data base and sells them to marketers
-
-
Experts claim contactless payments pose data security risk
RFID security expert Kevin Fu says level of data security to safeguard information during contactless payment cards transaction is insufficient
-
-
Schools short on cybersecurity training
The School Safety Index show that 95% of districts are blocking Web sites, but only 38% have a closed network that lets them control the content students can access
-
-
PatchLink merges with SecureWave
Merger of two Common Criteria certified companies will create comprehensive security platform for unified protection and control of all enterprise servers and endpoints
-
-
Ten companies win government DAR contracts
More and more government employees carry more and more laptops; there is a need to secure the data — DAR, for data at rest —on the hard drives of these laptops in case they are lost or stole
-
-
Identity theft victims to be compensated
ChoicePoint compiles and sells personal information, and in 2005 it sold information about many consumers to identity thieves; the FTC-ChoicePoint settlement may be a model for similar cases in the futrue
-
-
New details about AT&T's cooperation with the NSA in domestic spying
Scope of AT&T-NSA collusion in domestic spying on AT&T customers’ Internet traffic revealed in court documents
-
-
NIST issues revised security controls guide
Making sure information systems are secure is a daunting challenge; NIST’s revised — and hefty — guide would help IT managers cope
-
-
Broadcom acquires GPS specialist Global Locate
Broadcom pays $146 million for GPS specialist with a technology that reduces location identification from minutes to seconds
-
-
Online security experts in legal gray area
Laws hampers the ability of online security experts do their job dilligently and effectively — not a good thing when the use of Web-based applications grows by leaps and bounds
-
-
Quantum encryption: Inherently unbreakable or vulnerbale to hacking?
As debate continues about whether or not quantum encryption is inherently unbreakable, a team of researchers was able to create an encryption key in two locations simultaneously, 144 kilometers apart
-
-
Quantum keys sent over 200-km fiber-optic link
If properly executed, quantum encryption is unbreakable because eavesdropping changes the state of the photons
-
-
Air Force assesses cyber vulnerability
The more organizations become dependend on communication networks, the more they must ensure that these networks do not themselves become vulnerable to enemy attacks; this is what the U.S. Air Force is now doing
-
-
GAO says FBI's critical networks vulnerable to misuse
The FBI has made important strides since 2002 in securing its networks; the GAO says that sensitive and critical information transmitted on these networks is still not secure
-
-
Democrats wonder about possible cyberattack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.