Mar 31, 2009 -The Department of Homeland Security has released a free detection tool for federal and state agencies and private-sector partners that will scan their networks for the Conficker/Downadup worm, a malicious piece of software that has infected millions of computers worldwide but has yet to be activated.
Mar 27, 2009 -According to a patent filed last week, Apple wants to include biometric protections on devices ranging from the iPhone to Macbooks to preventunauthorized use or access to the personal data inside, reports the Web site AppleInsider.com.
Mar 26, 2009 -A cybersecurity expert with the Central Intelligence Agency (CIA) has added his voice to the chorus of criticism regarding the vulnerability of electronic voting systems to tampering, reports McClatchy.
Mar 25, 2009 -New Zealand's second largest telecommunications company has hired a hacking wunderkind, responsible for writing a multimillion dollar-generating botnet infiltration program, to help senior executives understand cybersecurity issues.
Mar 23, 2009 -Experts at Visa's annual security summit last week warned that cybercriminals are moving onto new and easier to exploit targets for their malicious software: small-to-medium-sized businesses, according to Dark Reading.
Mar 18, 2009 -Another high-level official has added his assessment to a rapidly expanding chorus of voices saying that the United States private and public computer networks are vulnerable to cyberattack: Air Force Gen. Kevin Chilton, reports The Washington Post's Walter Pincus.
Feb 23, 2009 -The nation's cybersecurity relies as much on education and culture as it does technology and governance, according to participants in a forum held by the Institute for Information Infrastructure Protection.
Feb 19, 2009 -The recent theft of three Los Alamos National Laboratory (LANL) computers from an employee's home and the loss of a Blackberry in a foreign country has led the laboratory to institute a month-long review to ensure that all computers held off-site comply with data security policies, reports ComputerWorld.com.