News Briefs

Latest

Photos of Google's Latest $600 Million Data Center

Earlier this month, Google officially opened its new data center in South Carolina which was first reported during April of 2007 when the company announced its plans to invest $600 million in the project. This data center is one of the four new data center projects announced by Google last year with other locations being Lenoir, North Carolina; Council Bluffs, Iowa and Pryor, Oklahoma. more»

Energy Industry Number One Target by Cyber Criminals, According to New Study

Web security company, ScanSafe reports that, in the past quarter, companies in the Energy industry faced the greatest risk of Web-based malware exposure, at a 196% heightened risk compared to other verticals. The Pharmaceutical and Chemicals industry faced the second highest risk of exposure at 192% followed by the Construction & Engineering industry at 150%. The Media and Publishing industry were also among those at highest risk, with a 129% heightened risk compared to other verticals. more»

Direct Correlation Between Economic Cybercrime and Stock Market Declines, Reveals Security Group

Security researchers and PandaLabs have issued a security alert today revealing a direct correlation between the recent stock market volatility and the growth of new threats. According to firm, the two are tied together much more closely than previously thought and recent stock market instability has accelerated the volume of targeted cyber attacks and their relative impact on the economy over the last month and a half. In addition, analysts believe the recent spike in malware could be related to cybercriminals now having fewer possible targets as a result of consolidation within the banking industry. more»

Experts See No Spam Declines After Shutdown of Largest Spam Operation

Last week's bust of the largest spam operation in the world has had no measurable impact on global spam volumes, according to reports. The spam gang, known by authorities and security experts as HerbalKing, was reported to have been responsible for one-third of all spam. One of the ringleaders, New Zealander Lance Atkinson, 26, who lives in Pelican Waters in Queensland, has had his US assets frozen by a U.S. district court at the request of the U.S. Federal Trade Commission, which also succeeded in having the spam network shut down via an injunction. more»

IT Security Guide: "Financial Impact of Cyber Risk" Released by ANSI and ISA

The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) released today a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack. In 2004, the Congressional Research Service estimated the annual economic impact of cyber attacks on businesses -- which can come from internal networks, the Internet or other private or public systems -- to be more than $226 billion. In 2008, U.S. Department of Homeland Security Secretary Michael Chertoff named cyber risks one of the nation's top four priority security issues. more»

Vint Cerf Short Listed as Obama's Chief Technology Officer, Say Washington Insiders

The proposed Technology Plan of U.S presidential candidate Senator Barack Obama includes a section titled "Bring Government into the 21st Century" which aims at using technology to reform U.S. government and enhancing the exchange of information between the federal government and citizens while ensuring the security of the nation's networks... om Lowry of BusinessWeek reports: "Among the candidates who would be considered for the job, say Washington insiders, are Vint Cerf, Google's (GOOG) "chief internet evangelist," who is often cited as one of the fathers of the Internet; Microsoft (MSFT) chief executive officer Steve Ballmer; Amazon (AMZN) CEO Jeffrey Bezos; and Ed Felten, a prominent professor of computer science and public affairs at Princeton University" more»

Universities Spending $80K to Over $100K Per Year on Policing P2P Activities

As a result of the new P2P filesharing mandates signed into U.S. law this past summer, the country's 4400 colleges and universities are required to address issues of illegal P2P filesharing -- particularly music and movies. For instance, colleges and universities are "required to consider the use of technology-based deterrents" in developing plans to counter illegal P2P activity, such as traffic monitoring and bandwidth shaping. A new study by the Campus Computing Project reports the results of a summer 2008 survey aimed at addressing the campus costs of compliance with the new P2P filesharing mandates. more»

EFF Challenges Telecom Immunity Law in Court

The Electronic Frontier Foundation (EFF) Thursday challenged the constitutionality of a law aimed at granting retroactive immunity to telecommunications companies that participated in President Bush's illegal domestic wiretapping program. In a brief filed in the U.S. District Court in San Francisco, EFF argues that the flawed FISA Amendments Act (FAA) violates the federal government's separation of powers as established in the Constitution and robs innocent telecom customers of their rights without due process of law. Signed into law earlier this year, the FAA allows for the dismissal of the lawsuits over the telecoms' participation in the warrantless surveillance program if the government secretly certifies to the court that either the surveillance did not occur, was legal, or was authorized by the president. Attorney General Michael Mukasey filed that classified certification with the court last month. more»

China to Photograph Internet Cafe Customers

According to the latest rules, all internet cafes in Beijing must install cameras to record the identities of their internet users, who must by law be 18 or over. There are more than 250 million internet users in China, approximately 10 times more than there were in 2000. By the end of the year, all of the city's 1,500 Internet cafés will be equipped with a camera and an ID card scanner. The cafes will be required to take photos and swipe the IDs of first-time visitors before they are allowed to surf the Internet. Once acquired, the information will be passed to Municipal Law Enforcement Agency of Beijing, which is in charge of the monitoring work. Repeat visitors would get a net café user number which they can input to log in the computer. more»

Secret Service, IBM, Others Form Alliance to Fight Cyber Crime, Identity Theft

A coalition of leading corporate, government and academic institutions today announced the formation of the Center for Applied Identity Management Research (CAIMR). CAIMR plans include developing research and solutions for identity management challenges such as cyber crime, terrorism, financial crimes, identity theft and fraud, weapons of mass destruction, and narcotics and human trafficking. The Center brings cross-disciplinary experts in criminal justice, financial crime, biometrics, cyber crime and cyber defense, data protection, homeland security and national defense to address identity management challenges that impact individuals, public safety, commerce, government programs and national security. more»

New DPI Technology Allows ISPs to Inspect Every File, Image, and Movie Transmitted by Users

MSNBC reports that an Australian company, Brilliant Digital Entertainment Ltd., is marketing a new controversial deep packet inspection technology called CopyRouter in the U.S. cable of allowing ISPs to check every file passing through their network. More specifically, this technology can check "every image, every movie, every document attached to an email or found in a Web search," to see if it matches a list of illegal images from a law enforcement agency. more»

$300 Million Annual Loss Due to Non-Cooperation in Fight Against Phishing

During a presentation today at the eCrime Researchers Summit in Atlanta, Georgia, security researchers revealed that average lifetime of malicious websites are often longer than they should be due to lack of communication and cooperation between security vendors. According to results, website lifetimes are extended by about 5 days when "take-down" companies -- often hired by Banks -- are unaware of the site. "On other occasions, the company learns about the site some time after it is first detected by someone else; and this extends the lifetimes by an average of 2 days," says Richard Clayton. more»

ARIN and CAIDA Announce Survey Results on Current and Future Use of IPv6

The American Registry for Internet Numbers (ARIN) and the Cooperative Association for Internet Data Analysis (CAIDA) have surveyed 1100 people across the world in order to gather information about the current and future use of IPv6. Results suggest that interest in IPv6 is growing, although activity is more likely to occur in research and education networks or those serving government needs than in the for-profit (and generally low-margin) commercial sector. more»

Global Threat to U.S. Cybersecurity a Major Concern, Says FBI

Shawn Henry, the newly appointed Assistant Director of FBI's Cyber Division has warned that "a couple dozen" countries are eager to hack U.S. government, corporate and military networks. Although specific details of countries in question were not discussed, reporters were informed during yesterday's meeting that cooperation with overseas law enforcements is of highest priority at FBI and so far there has been great success fostering partnerships. more»

Cyber Security Forecast for 2009: Data and Mobility Key Part of Emerging Threats

Georgia Tech Information Security Center (GSTISC) today held its annual Security Summit on Emerging Cyber Security Threats and released the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year... According to the report, data will continue to be the primary motive behind future cyber crime-whether targeting traditional fixed computing or mobile applications. "It's all about the data," says security expert George Heron -- whether botnets, malware, blended threats, mobile threats or cyber warfare attacks. more»

Latest News

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days

Sponsored Topics