Cybersecurity

Sponsored
by

Cybersecurity / Most Viewed

Hackers Stole Info on $300B Fighter Jet Program, US Defense Secretary Responds on 60 Minutes

Defense Secretary Robert Gates said Tuesday that the United States is "under cyber-attack virtually all the time, every day" and that the Defense Department plans to more than quadruple the number of cyber experts it employs to ward off such attacks. In an interview for an upcoming edition of 60 Minutes, CBS News anchor Katie Couric asked Gates about the nation's cyber security after hackers stole specifications from a $300 billion fighter jet development program as well as other sensitive information... more

US Teaming Up With Italy to Combat Cybercrime

The head of the U.S. Secret Service on Tuesday signed a memorandum of understanding with the head of the Italian police and the chief executive officer of the Italian Postal Service to set up an international task force to combat cyber crime. The European Electronic Crime Task Force -- not to be confused with the private study group of the same name that began operating in 2003 -- will tackle identity theft, hacking and other computer-based crime from a headquarters in Rome, Italian officials said... more

F-Secure Third Security Vendor Attacked in One Week

A Romanian hacker site said on Wednesday it was able to breach the website of Helsinki-based security firm F-Secure just as it had gained access to the sites of two other security companies earlier in the week. F-Secure is "vulnerable to SQL Injection plus Cross Site Scripting," an entry on the HackersBlog site said. "Fortunately, F-Secure doesn't leak sensitive data, just some statistics regarding past virus activity." more

Washington Debates: When is a Cyberattack an Act of War?

Cyberattacks against Georgia have started debates in Washington on whether the laws of war apply in cyberspace, Siobhan Gorman reports in the Wall Street Journal today. "Cyberweapons are becoming a staple of war. The Georgian conflict is perhaps the first time they have been used alongside conventional military action. Governments and private cyberwarriors can exploit Internet security gaps to not only take down government Web sites but also take control of power grids and nuclear reactors." One key deciding factor, according to one expert in the report, is whether the tools of cyberattacks are weapons? more

US Banks Face New Demands by Regulators for Higher Cyber Risk Management Standards

U.S. bank regulators on Wednesday outlined cyber security standards meant to protect financial markets and consumers from online attacks against the nation's leading financial firms," Patrick Rucker reporting in Reuters. more

Cyber Threats Accelerate: 94% of Web Browser Exploits Occur Within 24 Hours of Disclosure

Today X-Force, IBM's security research and development arm, released its 2008 Midyear Trend Statistics report that indicates cyber-criminals are adopting new automation techniques and strategies that allow them to exploit vulnerabilities much faster than ever before. The new tools are being implemented on the Internet by organized criminal elements, and at the same time public exploit code published by researchers are putting more systems, databases and ultimately, people at risk of compromise. more

US Transportation Department: Air Traffic Control System Vulnerable to Cyberattack

The Federal Aviation Administration’s air traffic control system is vulnerable to cyberattacks via Web applications that support the system, according to a new report released by the Transportation Department’s Office of Inspector General (OIG). “In our opinion, unless effective action is taken quickly, it is likely to be a matter of when, not if, [air traffic control] systems encounter attacks that do serious harm to [air traffic control] operations,” wrote Rebecca Leng, DOT’s assistant inspector general for financial and information technology audits, in the report... more

VeriSign, Critics Gear Up for ICANN Hearing

A VeriSign Inc. official defended its contract to operate the .com domain Monday, after Network Solutions accused the Internet Corporation for Assigned Names and Numbers (ICANN) of not requiring adequate security safeguards in its registry agreements. Network Solutions, a domain-name registrar, released a report last week saying ICANN has "failed" to address security in its latest proposals for the .com, .biz, .info and .org top-level domains. more

US Defense Secretary to Announce Creation of New Military 'Cyber Command'

The Obama administration plans to create a new military command to coordinate the defense of Pentagon computer networks and improve U.S. offensive capabilities in cyberwarfare, according to current and former officials familiar with the plans. The initiative will reshape the military's efforts to protect its networks from attacks by hackers, especially those from countries such as China and Russia. The new command will be unveiled within the next few weeks, Pentagon officials said... more

85 Billion Messages a Day, Spam Up 35% in November

Spam volume soared another 35% in November, an e-mail security vendor said Thursday, and the month saw spam tactics that reduced the efficiency of traditional anti-spam filters. ..."from 31 billion spams a day on average in October 2005 to 63 billion in October 2006. But in November, we saw two surges that averaged 85 billion messages a day, one from Nov. 13 to 22, the other from Nov. 26 to 28. more

Most Websites Harbor at Least One Major Vulnerability, Says Report

Most Websites harbor at least one major vulnerability, and over 80 percent of Websites have had a critical security flaw, according to new data released today by WhiteHat Security. The Website vulnerability statistics, based on Website vulnerability data gathered from WhiteHat's own enterprise clients, show that 63 percent of Websites have at least one high, critical, or urgent vulnerability issue, and there's an average of seven unfixed vulnerabilities in a Website today... more

China Slashes .CN Domain Price to 13 Cents

CHINA'S top Internet address registration agency has slashed the price of domain names ending with .cn to one yuan (13 US cents) a year in order to win users from the ".com" service, whose server is overseas.

The China Internet Network Information Center, or CNNIC, said the promotion is for the sake of national information security and to increase Internet use in the world's second-largest Web market. more

US Concerned Over Chinese Cyber Espionage

China is actively conducting cyber espionage as a warfare strategy and has targeted U.S. government and commercial computers, according to a new report from the U.S.-China Economic and Security Review Commission. "China's current cyber operations capability is so advanced, it can engage in forms of cyber warfare so sophisticated that the United States may be unable to counteract or even detect the efforts," according to the annual report recently delivered to Congress. more

Cybercriminals Profiting from Global Recession and Distracted Governments

McAfee, Inc. today announced findings from its annual cybersecurity study in which experts warned that the recession is proving a hotbed for fraudulent activity as cybercriminals capitalize on a climate of consumer fear and anxiety. The economic downturn is diverting political attention worldwide and cybersecurity is not enough of a priority around the globe for real headway to be made against the perpetrators of online crime. Experts warned that unless significant resources are committed to international efforts to fight malicious cyberactivity, there is a risk that cybercrime will impact consumer confidence, further hindering the speed of global recovery. more

New Administration Outlines US Cybersecurity, Advisor to Report Directly to Obama

On his first full-day as US President, Barack Obama on Wednesday outlined plans to declare the country's computer infrastructure a national asset that will be protected by a cyber advisor who will report directly to the president. Part of a broader strategy laid out on the newly revamped Whitehouse.gov website for securing US soil against terrorist attacks and other emergencies, the plan is designed to shore up IT networks and chemical and electrical facilities and prevent cyber-espionage. more

Industry Updates

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

CSC at RSA and the Cybersecurity Tech Accord Reception

The Perils of Typosquatting: The Likely Targets and the Price They Pay

Domain Squatting Disputes: How WHOIS Lookup Tools Can Help

Post-GDPR WHOIS Domain Search: Are Cybercrime Investigations More Difficult to Do?

How to Avoid Fraudulent Classifieds Sites with WHOIS Domain Name Search Tools

How Domain Reputation API Can Help Detect HTTPS-Protected Phishing Sites

Reverse Domain Hijacking and the Use of WHOIS and Domain Brand Monitoring Tools

DNS Hijacking: The Iranian Cybersecurity Threat That May Be Overlooked

Addressing Cybersquatting Dangers Using Brand Alert API and WHOIS Lookup

Retrospective: Post-GDPR Compliance Rates for Domain Enforcement

Fake Airline Ticket Scams: Domain Spoofing and Other Red Flags

Reverse Domain Name Hijacking: What It Is and How to Avoid It through a Domain Availability Check

The Need for Email Address Verification in Light of Subpoena-Themed Phishing Attacks

Mobile Apps Take the Lead, Scammers Follow