• Dueling legislation over cybersecurity regulations

     

    Attacks on U.S. critical infrastructure may bring about a Katrina-like situation: no electricity, no fresh water, limited traffic control, severely curtailed emergency response, and more; about 85 percent of U.S. critical infrastructure is privately owned; two different cybersecurity bills in Congress envision different solutions to U.S. infrastructure’s cyber vulnerability

  • Cybersecurity firm discovers mutant computer viruses

    Cybersecurity firm BitDefender recently announced that it had uncovered multiple instances of computer viruses infecting other viruses to create “Frankenware”

  • DHS to work with Netherlands on cybersecurity

    On Wednesday DHS Secretary Janet Napolitano signed a letter of intent to work with the Netherlands on several critical cybersecurity initiatives

  • Justice Department appoints new CIO

    Last Friday the Justice Department appointed Luke McCormack as the agency’s new chief information officer

  • view counter
  • Lockheed Martin UK opens its U.K. cybersecurity center

    Lockheed Martin UK has officially opened its first Security Intelligence Center (SIC) at Farnborough; the role of the SIC will be detection, identification, and response to information security incidents; this is accomplished by bringing together three primary capabilities: pervasive sensors, data management, and analyst collaboration

  • DHS: Hackers did not cause Illinois water pump to fail

    Cybersecurity experts and critical infrastructure operators can rest a bit easier now that DHS investigators have determined there is nothing to suggest that hackers caused a water pump to fail in Springfield, Illinois

  • view counter
  • Pentagon confirms policy of military response to cyberatacks

    In a Pentagon report recently made public, the U.S. military confirmed that it would launch physical strikes in response to cyberattacks

  • Cyber attacks on critical infrastructure reach U.S.

    Most of the U.S. critical infrastructure is run by computers which are connected to the Internet; this makes them susceptible to cyber attacks; a few days ago the control system of a water pump in Illinois was taken over by a hacker’s remote command, and then deliberately destroyed; what critical infrastructure facilities will hackers — nerdy teenagers, terrorists, or intelligence operatives of other nations — target next?

  • Cyber attacks on critical infrastructure reach U.S.

    Most of the U.S. critical infrastructure is run by computers which are connected to the Internet; this makes them susceptible to cyber attacks; a few days ago, the control system of a water pump in Illinois was taken over by a hacker’s remote command, and then deliberately destroyed; what critical infrastructure facilities will hackers – nerdy teenagers, terrorists, or intelligence operatives of other nations – target next?

  • Duqu mystery deepens as Iran admits infection

    Iran recently revealed that the Duqu virus, a possible pre-cursor to a Stuxnet-like attack, has been discovered in its computer network; “We are in the initial phase of fighting the Duqu virus,” said Gholamreza Jalali, the head of Iran’s civil defense program

  • Nations could cripple U.S. with retaliatory cyberattack

    Last week Richard Clarke, a top adviser to three presidents, sounded a dire warning that the United States should avoid going to war with other nations because its computer networks systems are so vulnerable to attack

  • Cyber war may never happen

    Cyber war, long considered by many experts within the defense establishment to be a significant threat, if not an ongoing one, may never take place according to one expert

  • ASIS 2011 -- combating cyber extremists

    At this year’s ASIS International conference, security experts will explore the effect of the Internet on terrorism, how extremist organizations are using it, and what can be done to stop it; the web has largely proven to be a boon to society, but malicious actors like terrorists have used the Internet to disseminate their radical ideas, recruit new members, and share weapons and bomb building training manuals; terrorist websites have proven to be reliable sources for intelligence as well as dangerous meeting places, but shutting them down has proven to be more complicated than anticipated

  • Report warns U.S. unprepared for cyber attacks

    A new report warns that the United States lacks the capabilities to defend against expanding cyber threats; the report found, “The impact has increased in magnitude, and the potential for catastrophic collapse of a company has grown,” yet the businesses community has failed to understand that

  • Chinese TV shows cyber-attack software

    A Chinese government TV station, perhaps inadvertently, shows a government cyberattack aimed at Falun Gong computers; the video identifies the software as being written by the Electrical Engineering University of the People’s Liberation Army; the video — which has been removed from the TV station’s Web site — provides direct evidence of Chinese government involvement in cyberattacks