-
Government contractors now required to have cybersecurity plans
Based on a new General Services Administration (GSA) rule, all contractors and subcontractors that provide federal agencies with IT services, systems, or supplies are required to submit a cyberescurity plan that matches government regulations
-
-
UMD, Lunarline partner on cybersecurity
The University of Maryland Cybersecurity Center will partner with Lunarline Inc. on cybersecurity education, research, and technology development
-
-
Wireless passwords vulnerable to hackers, US-CERT warns
The U.S. government is warning wireless users that their home and business networks are highly vulnerable to hackers
-
-
Smartphone users hold false sense of security
A recent study reveals that smartphone users maintain a false sense of cybersecurity
-
-
McAfee releases 2012 cyber threat predictions
The cyberthreats organizations and individuals are likely to face in 2012 will resemble those they faces in 2011, only more so; among the increased threats: attacks on critical infrastructure, mobile devices and consumer electronics, and politically motivated attacks
-
-
DHS, Idaho lab win cybersecurity innovation award
The Controls Systems Security Program (CSSP) at DHS and Idaho National Laboratory have created a series of training programs for managerial and technical people in the critical infrastructure sector that are packed with up-to-date information on cyber threats and mitigations for vulnerabilities
-
-
Anonymous threatens Internet blackout over controversial legislation
The hacker group Anonymous has vowed to blackout the Internet if U.S. lawmakers pass the controversial Stop Online Piracy Act; under the bill, government powers would be greatly expanded, enabling the Justice Department working at the behest of individual copyright holders to shut down Web sites for potential copyright violations
-
-
Lawmaker targets fake ID smartphone app
With the “License” app for Apple iPhones and iPads, making a realistic fake ID has never been easier; to prevent this app from falling into the wrong hands that would use it for nefarious purposes, Senator Bob Casey (D — Pennsylvania) recently requested that Apple remove the app from its online store
-
-
National Guardsmen, the new front line in cybersecurity
In an aggressive push to expand the military’s cyber warfare and defense capabilities, the National Guard has formed an increasing number of special cybersecurity units; National Guard cybertroops have proven to be particularly appealing solution, especially with defense cuts looming, as they cost less to train, maintain, and retain than active duty forces
-
-
Twelve Chinese hacker groups responsible for attacks on U.S.
U.S. cybersecurity experts say as few as twelve different Chinese hacker collectives, working at the behest of the government, are responsible for the majority of cyberattacks on U.S. businesses and government agencies; the bulk of the attacks are stealthy in nature and have resulted in the loss of billions of dollars’ worth of intellectual property and state secrets from the private and public sector
-
-
Electrical grid needs cybersecurity oversight: study
In a recently released report, researchers from the Massachusetts Institute of Technology say that a single federal agency should be tasked with protecting the United States’ electrical grid from cyberattacks; the Obama administration has proposed that DHS assume responsibility for the grid, while Congress has submitted proposals for both the Department of Energy and the Federal Energy Regulatory Commission (FERC)
-
-
MIT report warns U.S. electrical grid vulnerable
A new report from the Massachusetts Institute of Technology warns that the U.S. electrical grid is vulnerable to cyberatacks; according to the report, the U.S. electrical grid’s cybersecurity vulnerabilities stem from weaknesses in processes, technology, as well as the actual physical environment
-
-
Shell fears cyberattack on oil infrastructure
Oil executives fear that a cyberattack on critical infrastructure could wreak havoc by destroying facilities or disrupting production
-
-
Government outlines cybersecurity R&D priorities
The Obama administration recently unveiled its plan for government sponsored cybersecurity research and development programs
-
-
SCADA systems’ vulnerability key weakness in Smart Grid deployments
The discovery of the Stuxnet worm in 2010 shone a harsh light on the fragility of industrial control systems (ICS), such as supervisory control and data acquisition (SCADA) systems, and has created a new urgency among security vendors and utility managers alike; new research forecasts that investments in ICS security will total $4.1 billion during the years between 2011 and 2018
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.