National Cybersecurity
Mills, E. (2011, November 22). DHS denies report of water utility hack. CNET. Retrieved from http://news.cnet.com/8301-27080_3-57330029-245/dhs-denies-report-of-water-utility-hack/
The Department of Homeland Security and FBI today dismissed the
conclusions of a report that a cyber intrusion caused a pump at an
Illinois water utility to burn out. But the statement doesn't explain
why an Illinois state terrorism intelligence center would say it was a
hacker when it wasn't. In the meantime, the DHS is investigating a claim by a hacker who goes by "pr0f" who claimed to have compromised a Texas water utility last week.
Global Cybersecurity
& broadly applicable items
Cyberwar explodes in Syria. (2011, November 22). CNN. Retrieved from http://www.cnn.com/2011/11/22/world/meast/syria-cyberwar/index.html
For the past eight months, Syria has been locked in a bloody cycle of
anti-regime protests and violent crackdown. The United Nations accuses
government security forces of systematic torture, disappearances and the
use of deadly force to crush dissent. More than 3,500 people have been
killed since March. The UN's top human rights monitoring commission has
repeatedly accused the Syrian regime of carrying out crimes against
humanity. But this bloody test of wills is not only being fought in the
streets. Activists, diplomats and IT specialists say there is also a
high-stakes war of information being waged in cyberspace. [Related article: "Senators ask for investigation of U.S. companies’ surveillance technology in Syria" (Government Security News).]
Khakkar, M. (2011, November 22). Indian govt. servers compromised and used against China. ZDNet. Retrieved from http://www.zdnet.com/blog/india/indian-govt-servers-compromised-and-used-against-china/767
Sources within Indian government’s IT arm – the National Informatics
Center (NIC) have raised some really dangerous concerns. According to
them the government’s IT infrastructure has been used by black hat
hackers to attack China. Talking to the Times of India a source said that the government servers have been compromised and used by foreign perpetrators.
NIST expands database designed to help programmers improve software security. (2011, November 23). Infosecurity. Retrieved from http://www.infosecurity-magazine.com/view/22201/nist-expands-database-designed-to-help-programmers-improve-software-security/
The National Institute of Standards and Technology has dramatically enlarged a databases intended to improve applications that help programmers identify security weaknesses in software, the agency announced this week. The database, known as the Software Assurance Metrics and Tool Evaluation Reference Dataset (SRD) version 4.0 . . . encompasses more than 60,000 specific cases of code errors, and addition of 100 more categories and 30 times the number of cases in SRD version 3.0.
Swerdlove, H. (2011, November 21). The most vulnerable smartphones of 2011. Retrieved from http://www.bit9.com/file /Bit9Report_SmartPhones2011.pdf
In this report, we analyzed the mobile market and identified the most vulnerable smartphones of 2011. What we found is that Android phones, which account for the majority of all new smartphones purchased in 2011, have the most complex software distribution model. Phone manufacturers and the phone carriers are responsible for distributing important updates, instead of Google, the makers of the Android operating system. The result is that Android phones are most likely to run for long periods of time with known security flaws. All 12 of the top most vulnerable phones in our report are Android models.