In the post-9/11 world, Susan Brenner, an NCR professor of law and
technology at the University of Dayton, worries about terrorists using
cybercrime for their own purposes. This week, Defense Secretary Robert
Gates told CBS News that the United States is "under cyber-attack
virtually all the time, every day" and that the Defense Department
plans to more than quadruple the number of cyber experts it employs to
ward off such attacks. This is not your grandma's Internet.
The White House should take direct control of US cybersecurity - with a little help from the private sector - according to the official who has just completed a national review of net security.
A recent study conducted by Marshal8e6 has determined that the
insidious Xarvester and Rustock spambots are capable of disseminating
over 25,000 messages per hour.
The US Navy Cyber Defense Operations Command (NCDOC) has selected
Novell's Sentinel to help secure various computer networks. The
platform integrates identity data with security event management, which
facilitates the efficient monitoring of resources across geographically
The world's largest-ever malware network has been uncovered, affecting 1.9 million corporate, government and consumer computers.
The Obama administration is reportedly poised to announce the creation
of a new military cyber command. National Security Agency (NSA)
Director Keith Alexander is currently the top candidate for the post.
Researchers at the Cyber Secure Institute estimate that the nefarious
Conficker worm has racked up a staggering $9.1 billion bill.
Security at the $300 billion Joint Strike Fighter project has been
breached by spies, with the finger being pointed at China.
Parabon Computation has introduced a new testing service designed to
help secure government and corporate networks against cyber attacks.
The company plans its first public demonstration of Blitz in Anaheim
this week at the Department of Defense (DoD) Defense Information
Systems Agency (DISA) Customer Partnership Conference, where it will
conduct live fire denial-of-service exercises.
Verizon Business has released a report which claims that organized
crime is actually responsible for the majority of increasing corporate
electronic records breaches. There were 285 million security breaches
last year, which was more than the total number of record breaches that
had occurred in the past four years combined.
On Tuesday, Microsoft issued eight security updates which are promised
to fix 23 security vulnerabilities, six of which were targeted by
exploit code, in its Windows Operating Systems and other Microsoft
Late yesterday a hacker, identifying himself as “Weev”, is now claiming
responsibility for the “glitch” on Amazon.com, which caused a multitude
of gay and lesbian themed books to lose their sales ranks over the
Easter holiday weekend. Weev posted his “confession” on a LiveJournal
discussion board on Monday morning.
The Twitter micro-blogging network has been hit by two cross-site
scripting (XSS) attacks that spread messages from user accounts across
the system without users' consent. The initial “StalkDaily” messages
that appeared over the weekend are now followed by a “Mikeyy” attack
that apparently can infect Twitter accounts simply by viewing another
infected Twitter page.
Late Wednesday, TrendMicro observed a new version of the Downad.KK/Conficker.c worm, dubbed Conficker.e. The previous version utilized its built-in P2P functionality to download the update, which then springs to life with fake or rogue antivirus messages warning of non-existent threats, along with annoying pop-ups until you agree to pay it $49.95. Conficker's authors finally unveil their true intent: Greed.
The third Conficker/Downadup worm, which hit computers on April 1, was
almost a disappointment given the excitement that had built up in the
weeks before. Those expectations were followed by a lot of nothing, but
it now seems that the malware has been quietly activated and downloaded
what the security firm described as yet another variant of the worm now called WORM_DOWNAD.E.
It seems that Bill Gates’ 2004 prediction that there would be no spam
anymore within a couple of years was wrong. According to Microsoft’s
latest Security Intelligence Report, the number of spam messages has
reached a dramatic level of 97% of all emails sent. However, the report
covered a variety of security concerns and had some good news as well.
Discovered vulnerabilities in software, for example, is down from its
It's being reported that the U.S. electrical grid has been infiltrated by hackers primarily from China, Russia, but also from other countries. The software does not do anything harmful, however it is giving remote entities knowledge of how our electrical grid operates, allowing them to "navigate the U.S. electrical system and its controls", according to the Wall Street Journal. It is cyber-spying, and it has targeted a critical U.S. asset -- our electrical grid.
VeriSign has teamed up with Apple to provide a second-factor authentication (2FA) token generator application for the iPhone. For those interested in maximizing their online security against fraud and theft, using a second-factor code, one which changes every 30 seconds, could be the best way to go. And now with VeriSign's iPhone app, you won't need to carry around a separate token or card. The iPhone becomes a one-stop shop for online 2FA security. In this article we explain the technology, and show you how to use it. EXTRAS: SLIDESHOW, VIDEO
The third variant of the Conficker worm was set to strike today, but to
a general surprise, humanity still exists. Will Conficker-C, despite
the dramatic warnings, be as harmless as the Y2K switch more than nine
The Conficker worm has been widely discussed in recent weeks, and the $250,000 bounty has had many on the hunt for the virus's origination. Microsoft offered the $250,000 for anyone who could provide information which leads to an arrest in the Conficker case.