-
Cybercrime statistics wildly inaccurate, says researcher
A cybersecurity researcher is questioning the various statistics that government officials and IT companies use as evidence of the rampant and deleterious effects of hackers; Cormac Herley, a principal researcher at Microsoft Research, argues that the existing data on the estimated losses from cyberattacks is wildly inaccurate to the point that analysts have no idea what the problem’s economic impacts are; one expert, noting that estimates of the annual cost of cybercrime range from $560 million to $100 billion to $1 trillion, asks: “How can this be? How can you have estimates of the same problem ranging across three orders of magnitude?”
-
-
International hacking group calls it quits
After a series of high-profile cyberattacks including attacks on Sony, the U.S. Senate, and the Arizona State Police’s websites, the international hacking group known as LulzSec has announced that they are officially disbanding; the group’s announcement comes shortly after British authorities working in conjunction with the FBI arrested a U.K. teenager for his affiliation with LulzSec; the group maintains that its decision was unrelated
-
-
Arizona police network latest LulzSec cyber victim
In the latest string of attacks on government computer networks by LulzSec, an international hacker network, the Arizona Department of Public Safety’s computer network was broken into and the group is publicly releasing hundreds of law enforcement documents
-
-
Study finds nearly 90 percent of businesses victim of cyber attacks
A recent survey of information technology (IT) security professionals reveals that cyberattacks are on the rise and businesses have had difficulty defending their networks; 84 percent admitted to having been the victim of a cyber attack; these attacks have been costly causing a majority of companies an estimated $500,000 or more in lost revenues, cash outlays, business disruptions, and other expenses
-
-
Estonia pushes for joint EU cyber response
European Union security officials recently met in Brussels for the European Security Round Table to discuss the creation of a unified approach to cybersecurity; the meeting’s organizers say the event was designed to promote “a comprehensive policy approach to cyber-security among EU institutions”; attendees included representatives from the European Parliament, the European Defense Agency, NATO, and private security organizations
-
-
DHS warns of critical vulnerabilities in Chinese software
Last week DHS warned that control software widely used in China’s weapons systems, utilities, and chemical plants has dangerous weaknesses that leave it open to hackers; the warning, issued by the DHS Industrial Control Systems Cyber Emergency Response Team (ISC-CERT), stems from critical vulnerabilities found in SCADA software developed by Beijing’s Sunway ForceControl Technology
-
-
Teenage hacker brings down British law enforcement agency's website
A nineteen year old has been arrested by British authorities for attacking the website of the Serious Organized Crime Agency (SOCA); the teenager has also been charged with bringing down the websites of the International Federation of the Phonographic Industry and the British Phonographic Industry; the FBI worked in conjunction with British investigators; authorities believe the hacking group LulzSec is behind the attacks
-
-
China's sustained cyberattacks on U.S. are an economic, strategic threat
China has been engaged in a sustained guerrilla cyber war against the United States, with two goals in mind: first, stealing research and development, software source code, manufacturing know-how, and government plans; second, to counter American military superiority by threatening to damage the underpinning of the U.S. economy; that Congress and the administration do nothing in the face of these cyber assaults is puzzling
-
-
Turkey apprehends 32 Anonymous hackers, group vows retaliation
In the continuing crackdown against the international hacking ring known as Anonymous, Turkey has apprehended thirty-two individuals suspected of online cyber attacks against government websites; Turkish officials made the arrests following a cyber attack on the government’s telecommunications agency’s website; officials feared that the group would strike again during national elections; undeterred by the arrests, Anonymous announced that it would resume its attacks on Tuesday night
-
-
Three arrested in PlayStation cyberattacks
On Friday, Spanish law enforcement officials arrested three men suspected of hacking into Sony’s PlayStation Network in addition to other major government and corporate websites around the world; the three men are suspected of being the local leaders of a secretive group of international hackers that call themselves Anonymous; the group has claimed responsibility for several high profile attacks on major sites like YouTube, Amazon, the Australian Parliament’s House website, and PayPal
-
-
FBI leads Lockheed Martin cyberattack investigation
The FBI recently announced that it is leading a federal investigation into a cyberattack on defense giant Lockheed Martin’s networks; the investigation will be led by the National Cyber Investigative Joint Task Force and is aimed at determining if the attack was a result of “poor hygiene, if nothing was infiltrated and nothing taken or something more”; on 21 May, the company detected a “significant and tenacious” attack on its networks that was met with a swift response; the FBI declined to comment on what actions it would take if the investigation revealed that the attacks were perpetrated by state or non-state actors
-
-
Hackers using cloud networks to launch powerful attacks
In a disturbing new trend, hackers have begun harnessing the vast computing power of cloud based servers to carry out powerful cyber attacks; cloud computing services piece together large strings of online servers and storage systems to provide users with enormous processing power and terabytes of storage space; earlier this year, a German researcher, demonstrated that a cloud server could fire 400,000 passwords a second at a secured Wi-Fi network; in the recent attacks that shut down Sony’s online customer networks in April, hackers used cloud based attacks to disrupt service to roughly 100 million users worldwide
-
-
U.S. will "view major cyber attacks as acts of war"
The Pentagon has adopted a new strategy that will classify major cyber attacks as acts of war, paving the way for possible military retaliation; “If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” a U.S. military official said; the move to formalize the Pentagon’s thinking was borne of the military’s realization the United States has been slow to build up defenses against cyber attacks, even as civilian and military infrastructure has grown more dependent on the Internet; the military established a new command last year, headed by the director of the National Security Agency (NSA), to consolidate military network security and attack efforts
-
-
Data breaches compromise nearly 8 million medical records
The revelation that millions of people have had their personal medical records stolen could slow the Obama administration’s efforts to digitize the nation’s health care records; in the last two years alone nearly eight million people have had their medical records stolen or compromised; 1.7 million patients, staff members, contractors, and suppliers at several New York hospitals had their information stolen when thieves removed them from an unlocked van; to ensure that medical records are safe, HHS has begun imposing penalties on health care providers who compromise their patient’s records; but some health care experts wonder if enforcing HIPAA alone will be enough to address the problem
-
-
Digital ants protect critical infrastructure
As the U.S. electrical power grid becomes more interconnected through the Internet, the chances of cyber attacks increase as well; a Wake Forest University security expert developed “digital ants” to protect critical networks; unlike traditional security approaches, which are static, digital ants wander through computer networks looking for threats such as computer worms, self-replicating programs designed to steal information or facilitate unauthorized use of computers; when a digital ant detects a threat, it summons an army of ants to converge at that location, drawing the attention of human operators to investigate
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.