Experts: U.S. needs to defend its "cyber turf"
The United States must develop a Monroe Doctrine for the Internet, defining what constitutes its cyberspace and pledging to defend its virtual borders, security experts told Congress. 2009-03-11 http://www.securityfocus.com/news/11548 Advisor: U.S. needs policy to defend cyberspace An Obama transition-team member argues that any future cyber policy needs to deal with the role of the intelligence community, the militarization of cyberspace and designating a lead disaster agency. 2009-02-19 http://www.securityfocus.com/news/11547 Cabal forms to fight Conficker, offers bounty Microsoft offers $250,000 for information leading to the arrest of the author and, along with security firms and Internet service providers, pledges to work to prevent the prolific worm from spreading further. 2009-02-13 http://www.securityfocus.com/news/11546 Group releases list to kill most-dangerous bugs Software makers, security vendors, and government agencies team up to create a list of the 25 most severe software issues, aiming to get developers to stop making mistakes. 2009-01-13 http://www.securityfocus.com/news/11542 Group attacks flaw in browser crypto security A group of researchers warns browser makers and certificate authorities to drop support for MD5 digital signatures, after successfully creating a fake, but valid, certificate. 2008-12-30 http://www.securityfocus.com/news/11541 Commission calls for cybersecurity czar A group of technology and government experts warns that, without significant changes to the U.S. approach to cyberspace, foreign companies and other nations will continue to steal valuable technologies. 2008-12-08 http://www.securityfocus.com/news/11540 Microsoft hopes free security means less malware The software giant says shutting down Windows Live OneCare to release the software as a free tool could make consumers more secure. 2008-11-20 http://www.securityfocus.com/news/11538 Researchers find more flaws in wireless security Two security experts plan to show a limited attack against the popular Wi-Fi Protected Access (WPA) -- a replacement for insecure WEP -- at a conference in Tokyo. 2008-11-06 http://www.securityfocus.com/news/11537 Secure hash competition kicks off Dozens of amateur and professional cryptographers have joined the United States' first open competition for creating an uncrackable algorithm for generating hashes -- the digital fingerprints widely used in a variety of security functions. 2008-11-03 http://www.securityfocus.com/news/11536 You don't know (click)jack Security professionals Robert "RSnake" Hansen and Jeremiah Grossman discuss a class of attacks, known as clickjacking, on user interfaces of Web browsers. 2008-10-15 http://www.securityfocus.com/news/11535 |
|
Privacy Statement |