November 26, 2013
Biometrics Researchers See a World Without Passwords
Some Purdue University researchers are working on technology that could see all those passwords that computer users must punch in replaced with steps such as iris and fingerprint scans.
The basement lab of Purdue University’s International Center for Biometrics Research is where such emerging biometric technologies are tested for weaknesses before going mainstream.
August 18, 2013
A New ‘Dawn’ in Exchanges’ War on Hackers
Gaining access to computers used by programmers who work on exchanges’ trading systems could let a hacker set a time-bomb to disrupt markets or open a back door to enable further meddling. Taking over a brokerage’s trading operation and releasing a wave of fake orders is another threat, potentially destabilizing the victimized firm and leaving scores more holding unwanted positions.
August 18, 2013
Can Next Gen Phones Deliver Next Gen Security?
Biometrics haven’t made significant inroads on any device, and forthcoming technologies like Google Glass still seem a long way from being secure. Hopefully, the brains behind the electronic toys will continue baking in device security.
August 12, 2013
Survival of the Fittest: New York Times Attackers Evolve Quickly
As long as these actors regularly achieve their objective (stealing sensitive data), they are not motivated to update or rethink their techniques, tactics, or procedures (TTPs). These threat actors’ tactics follow the same principles of evolution – successful techniques propagate, and unsuccessful ones are abandoned. Attackers do not change their approach unless an external force or environmental shift compels them to. As the old saying goes: If it ain’t broke, don’t fix it.
June 24, 2013
Quantum Mechanics: The Answer to Cybersecurity?
Quantum cryptography could prevent hacking because such a security system relying on quantum mechanics could destroy or change messages at the same time as hackers are trying to break into them, as ABC says. Hackers can now intercept messages and data or destroy or alter these without the sender knowing. In quantum cryptography, the very act of hacking would destroy the data at that very moment.
June 23, 2013
Cyber Security in the Internet of Things
Succeeding in the IoT era will depend on defining and deploying not only the right cybersecurity technologies, but also the right policies and operations. The potential of the IoT to yield value for you, your customers, and all of society is vast. We must rethink the cyber security regimes that threaten to limit it.
June 11, 2013
The cyber security challenge
he popular and specialized literature is replete with articles analyzing the problem and advocating responses to this challenge. Congress is mobilizing committees and sub-committees to address the myriad of issues that cyber technology has raised. The National Academies have already conducted several major studies looking at the appropriateness of offensive operations, cyber deterrence, and other issues. This is taking place as the executive branch conducts an intensive effort to sort out areas of authority and responsibility so that there is a coherent governmental approach to the challenge.
June 10, 2013
Silent War – the changing nature of the new cyber-warfare
On the hidden battlefields of history’s first known cyber-war, the casualties are piling up. In the U.S., many banks have been hit, and the telecommunications industry seriously damaged, likely in retaliation for several major attacks on Iran. Washington and Tehran are ramping up their cyber-arsenals, built on a black-market digital arms bazaar, enmeshing such high-tech giants as Microsoft, Google, and Apple.
June 2, 2013
Don’t pop those free thumb drives into your computer
U.S. Rep. Mike Rogers offered a warning Friday to participants at the Mackinac Policy Conference: Don’t pop those free thumb drives into your computer.
“It’s the most common way to interject a virus into your computer,” the Howell Republican told the Mackinac Island audience of state political, business and nonprofit leaders. “You wouldn’t see gum on the street and pick it up and pop it in the our mouth.”
May 30, 2013
An Internet that learns to defend itself
An intelligence-driven security model consists of a thorough understanding of risk, the use of agile controls based on pattern recognition and predictive analytics to replace outdated controls, together with the ability to analyze vast streams of data to produce actionable information,
May 30, 2013
Cyberwar as Easy as Angry Birds
For the last year, the Pentagon’s top technologists have been working on a program that will make cyberwarfare relatively easy. It’s called Plan X. And if this demo looks like a videogame or sci-fi movie or a sleek Silicon Valley production, that’s no accident. It was built by the designers behind some of Apple’s most famous computers — with assistance from the illustrators who helped bringTransformers to the silver screen.
February 25, 2013
This week on the Communicators, Michael Daniel, Special Assistant to the President & White House Cybersecurity Coordinator. He discusses the President’s cybersecurity order issued last week (on Feb. 12), the mushrooming of cyberattacks and hacking overall, as well reports of an increasing number of cyberattacks on the U.S. from China.
February 11, 2013
Executive order on cybersecurity coming after State of the Union address
The administration, which has been drafting the order for at least six months, plans to set up voluntary cybersecurity standards for owners and operators of critical infrastructure such as water treatment plants, electric utilities and railway systems.
February 9, 2013
CISPA’s back: Hacking, online espionage resurrect cybersecurity bill
The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced before the US House next week following a spate of cyber espionage and hacking attacks. Civil liberties advocates have criticized the bill for violating privacy laws.
December 1, 2012
The future of internet is intelligent machines
In the near future, I expect nothing short of an open, global fabric of highly intelligent machines that connect, communicate and cooperate with us. This Industrial Internet is not about a world run by robots, it is about combining the world’s best technologies to solve our biggest challenges. It’s about economically and environmentally sustainable energy, curing the incurable diseases, and preparing our infrastructure and cities for the next 100 years.
To do this industry and government need to work together on two critical areas: standardization and security.
December 1, 2012
When It Comes to Security, We’re Back to Feudalism
Feudalism provides security. Classical medieval feudalism depended on overlapping, complex, hierarchical relationships. There were oaths and obligations: a series of rights and privileges. A critical aspect of this system was protection: vassals would pledge their allegiance to a lord, and in return, that lord would protect them from harm.