-
Estonia accuses Russia of botnet attacks
Former Soviet republic reports that Russian government computers are the source of a wave of botnet attacks; a dispute over a WWII monument heats up
-
-
Verizon signs deal to buy Cybertrust
Agreement is seen a “competitive coup” against the managed security industry; Verizon will also acquire certification firm ICSA Labs
-
-
Democrats wonder about possible cyber attack on nuclear facilities
Last summer’s shut-down of Brown’s Ferry prompt Thompson and Langevin to request a thorough review
-
-
SafeNet to make its IP avaliable on chipestimate.com
Network chip developers will be glad to see that SafeNet will allow centralized access to information about the its silicon IP security solutions at chipestimate.com
-
-
Experts express concern about REAL-ID security
National database could be a prime target for hackers; Smart Card Alliance modestly recommends smart cards as alterantive to bar codes
-
-
Debate over 700 MHz intensifies
Communication problems during 9/11 and Katrina have prompted calls for dedicating a portion of the 700 MHz spectrum for public-sfatey use; commercial interest have other ideas, and the FCC is caught in the middle
-
-
L-1 buys Maryland's Advanced Concepts
Robert LaPenta moves forward with the second phase of his acquisition strategy; network security and engineering firm expected to widen federal market access
-
-
$100 laptop for developing world poses IT security concerns
Mesh network system could turn a small African village into the largest botnet in the world; program’s enemies aim at the “$100 brick”
-
-
DHS plans back-up cross-agency data center
Worries about the Eastern Interconnect prompt DHS to build a mirror site in the west; contracts to be awarded this summer
-
-
Gonzales ignores critics, focuses on identity theft
Attorney General proposes a national information sharing system; presidential task force suggests national standards
-
-
Radio used to hack computer screens
An updated version of Van Eck Phreaking finds laptops vulnerable to this disturbing hacking technique
-
-
Enterprise VoIP Primer: The Secure Investment // by Daniel Zubairi, CISSP
VoIP offers many advantages to the organizations deploying them, but the technology also brings with it vulnerabilities that must be addressed
-
-
GD wins $6 biillion IWN contract
GD leads a team of IT heavyweights to build a nationwide interoperable wireless network linking the Justice, Homeland Security, and Treasury departments
-
-
Los Alamos cybersecurity focus of congressional hearing
The names of 550 Los Alamos employees were posted on the Web site of a former subcontractor; the information was gathered for a badge reader which was never used
-
-
HP adds security to network management package
HP adds two security applications to popular network management suite — and emphasizes adding security on the edge
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
To bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.