Is the U.S. the nation most vulnerable to cyberattack?

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Is the U.S. the nation most vulnerable to cyberattack?


Is the U.S. the nation most vulnerable to cyberattack?

Posted: 07 Apr 2010 05:00 AM PDT


Several nations, most prominently Russia, the People's Republic of China and North Korea, are already assembling cyber armies and attack weapons that could be used to attack other nations. Given that the United States is heavily dependent on technology for everything from computer-based banking to supply-chain tracking and air-traffic control, it's particularly vulnerable to the denial-of-service attacks, electronic jamming, data destruction and software-based disinformation tricks likely in a cyberattack.

From Cyber War: The Next Threat to National Security and What to Do About It

Posted: 07 Apr 2010 05:00 AM PDT


Cyber war is not some victimless, clean, new kind of war that we should embrace. Nor is it some kind of secret weapon that we need to keep hidden from the daylight and from the public. For it is the public, the civilian population of the United States and the privately owned corporations that own and run our key national systems, that are likely to suffer in a cyber war.

In cyberwar, who's in charge?

Posted: 07 Apr 2010 05:00 AM PDT


When the first salvos of cyberwar are fired against the United States, the responsibility to defend the country falls to the president who, aided by advisers from the broad spectrum of government agencies and also the private sector, must feel his way along an uncertain path to decide the appropriate response.

Think tank ponders war in cyberspace

Posted: 07 Apr 2010 09:00 AM PDT


When one nation launches a missile at another, it's easy to pinpoint the aggressor. But during a cyber attack, the aggressor may not be so identifiable, and the traditional rules of warfare don't quite fit.

33% of Brits think using pirated software is acceptable

Posted: 07 Apr 2010 09:00 AM PDT


A third of Brits think using pirated software either at home or work is acceptable, says Microsoft.

Adobe considers changes to mitigate PDF attack

Posted: 07 Apr 2010 09:00 AM PDT


Adobe Systems is considering modifying its PDF applications to counter a way to run arbitrary code on Windows computers by embedding it in a malicious PDF file.

Schmidt: Private Sector Key to Stopping Google-style Attacks

Posted: 07 Apr 2010 09:00 AM PDT


Recent attacks against Google point to a danger White House Cybersecurity Coordinator Howard Schmidt says we must confront. But the key to victory is not in the government. (See related articles under the Latest Headlines section to the right.)

Targeted cyberattacks test enterprise security controls

Posted: 07 Apr 2010 09:00 AM PDT


Targeted cyberattacks of the sort that hit Google and more than 30 other tech firms earlier this year are testing enterprise security models in new ways and pose a more immediate threat to sensitive data than a full-fledged cyberwar.

'Cyber War' author: U.S. needs radical changes to protect against attacks

Posted: 07 Apr 2010 09:00 AM PDT


Ex-Presidential advisor Richard Clarke writes: "U.S. military is no more capable of operating without the Internet than Amazon.com would be."

Quantum introduces a tape library, Cisco a new switch

Posted: 07 Apr 2010 09:00 AM PDT


This week Quantum and Cisco introduced a new tape library and Fibre Channel switch that help users grow is needed.

Who's responsible in the battle for Internet freedom

Posted: 07 Apr 2010 09:00 AM PDT


Who is legally responsible for the content of materials posted electronically via services such as value-added networks (the predecessors of the World Wide Web such as CompuServe, Prodigy and AOL) and the Web itself?

Facebook takes steps to deal with gift card scams

Posted: 07 Apr 2010 09:00 AM PDT


Like many other Facebook users Jeff Crites heard of the US$1,000 Best Buy gift-card offer last month from a friend, a Web savvy director of social media at a Fortune 500 company.

Maley: Here's How Firing REALLY Went Down

Posted: 07 Apr 2010 09:00 AM PDT


Former State of Pennsylvania CISO Robert Maley says there's been a lot of misinformation about his firing. At CSO Perspectives 2010, he sought to clarify things.

Are iPhones riskier than Android, Blackberry & Nokia phones?

Posted: 06 Apr 2010 09:00 AM PDT


iPhones appear to pose greater security risks than Android, Blackberry and Nokia smart phones, but is this really the case? An nCircle survey says yes, security expert Charlie Miller says not necessarily, and Pwn2Own sponsor TippingPoint won't say.

Document offers gloomy view of cloud

Posted: 06 Apr 2010 09:00 AM PDT


The Office of the Privacy Commissioner of Canada recently published a document about cloud computing titled "Reaching for the Cloud(s): Privacy Issues related to Cloud Computing." I didn't like this document at all.

IBM & the Masters: Technology Sponsorship Unlike Most Others

Posted: 06 Apr 2010 09:00 AM PDT


When viewers tune in to coverage of the 2010 Masters golf tournament, they will see IBM advertisements on the CBS and ESPN TV broadcasts and the IBM logo on the Masters.com website. Viewers will most likely hear about IBM's vision of a "smarter planet" campaign. (I always look forward to the guy who says "Smarter Stuttgart.")

Securing the iPad with an iPad

Posted: 06 Apr 2010 09:00 AM PDT


Mobility management start-up MobileIron recently announced MobileIron Sentry App, a mobile security application that manages Apple iPads and other mobile devices from -- you guessed it! -- the Apple iPad itself. The new Apple tablet is another device that must be secured and managed within the enterprise, and now it can also potentially serve as the security and management console for IT personnel on the go.

0 comments:

Post a Comment