-
GAO reports problems in cybersecurity hiring strategy
An audit by the Government Accountability Office (GAO) has found that some government agencies have failed to effectively develop or implement cybersecurity workforce planning strategies; agencies also reported problems in filling some cybersecurity positions, particularly those requiring specialized skills
-
-
Top Nine cyber security trends for 2012
Imperva, a data security specialist, see nine emergeing cyber security trends in 2012; rise in big data and application DDoS attacks among key concerns; “Hacking, by nature, is a discipline that relies on innovation,” explained Imperva CTO; “Knowing future, potential threats helps security teams fight against the bad guys”
-
-
A Winner in DARPA’S Shredder Challenge competition
A small team from San Francisco won the $50,000 first prize in DARPA’s Shredder Challenge, a competition among teams trying to reconstruct shredded documents; in total, the winning team spent nearly 600 man-hours developing algorithms and piecing together documents that were shredded into more than 10,000 pieces
-
-
Lockheed Martin UK opens its U.K. cybersecurity center
Lockheed Martin UK has officially opened its first Security Intelligence Center (SIC) at Farnborough; the role of the SIC will be detection, identification, and response to information security incidents; this is accomplished by bringing together three primary capabilities: pervasive sensors, data management, and analyst collaboration
-
-
Both hackers and security vendors are embracing the cloud
Large-volume hackers are now using the cloud for lucrative large-scale attacks, using public infrastructure to put at risk companies which adopt ambitious but poorly considered cloud-computing strategies. Even as they move to the cloud, too many companies simply move their security and reliability problems from the current infrastructure to the new one.
-
-
Congressional approval of cybersecurity bill looks promising
Amid the partisan acrimony of the budget battles on Capitol Hill, the Obama administration and the Senate have made promising efforts to pass a sweeping cybersecurity bill in a rare show of bipartisan agreement; the bill is now at the top of the Senate’s agenda, and Senator Harry Reid (D – Nevada), the majority leader, said he plans to bring the bill to the floor during the first working session of 2012
-
-
Some smartphones are more vulnerable to attack
New research shows that some smartphones specifically designed to support the Android mobile platform have incorporated additional features that can be used by hackers to bypass Android’s security features, making these phones more vulnerable to attack
-
-
U.K. unveils new cyber defense strategy
The U.K. government last week published its new Cyber Security Strategy; the government said the new strategy sets out “how the United Kingdom will support economic prosperity, protect national security, and safeguard the public’s way of life”
-
-
Anonymous retaliates against cyber investigators
The international hacktivist group known as Anonymous recently released two large torrents of stolen government data including details on forensic methodologies and information regarding current and former law enforcement agency employees; the latest attacks come in retaliation to harsh sentences given to members of its group
-
-
U.K. banks pass cyberdefense stress test
To bolster cyberdefenses in the financial industry, U.K. banks recently took part in a stress test to determine their ability to cope with a cyberattack; eighty-seven banks took participated in the drill including Barclays, HSBC, and Royal Bank of Scotland
-
-
Hackers fail in AT&T cyberattack
Last week AT&T announced that it had successfully fended off an attack by hackers; the company said it is still unclear what the hackers’ intentions were, but no accounts were breached
-
-
The 25 worst passwords of 2011
SplashData, a password management application provider, has released its annual list of the worst Internet passwords. The list was prepared from files containing millions of stolen passwords posted online by hackers. The worst password of 2011: “password.”
-
-
Nations could cripple U.S. with retaliatory cyberattack
Last week Richard Clarke, a top adviser to three presidents, sounded a dire warning that the United States should avoid going to war with other nations because its computer networks systems are so vulnerable to attack
-
-
Detecting insider threat from massive data sets
Researchers in a 2-year, $9 million project will create a suite of algorithms that can detect multiple types of insider threats by analyzing massive amounts of data — including email, text messages and file transfers — for unusual activity
-
-
Fewer but costlier cases of identity theft in U.S.
Identity fraud in the United States fell 28 percent in 2010 to 8.1 million from an estimated 11 million in 2009, according to Javelin Strategy &Research. The problem: thieves are becoming more creative in their methods of obtaining personal information, and those who suffer from identity theft are facing higher consequences, with the average out-of-pocket costs nearly doubling in the same time period to $631from $387 per incident.
-
More headlines
Who's online
The long view
U.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
U.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.