CyberEye

William Jackson

Bill Jackson (bjackson@1105govinfo.com), a senior writer for GCN, covers security issues.


Mordac is a fool: Just say ‘yes’ to new devices in the enterprise

Ensuring the security of new devices brought into the enterprise is a challenge, but if administrators don’t find a way to say “yes” to this technology, they are likely to find themselves in a losing battle with workers, says the Veterans Affairs Department’s CIO, Roger Baker.

Death, taxes – and spam in your inbox

After a brief respite, spam appears to be making a comeback. Like the poor, it will always be with us.

Internet Society sets the date for stress-testing IPv6

World IPv6 Day will provide a chance to see where the leaks and points of failures are in the Internet's IPv6 infrastructure.

Lego robot takes a shot at safe-cracking

The robot is designed to open combination locks by brute force by testing possible combinations.

Is government the odd man out in cyber defense?

DHS studied what worked and what didn't in fighting the Conficker worm, and government collaboration did not fare well.

Cyberattacks on infrastructure are the 'new normal'

In the wake of Stuxnet it is clear that our critical infrastructure "is in play," says Black Hat founder Jeff Moss, and resilience is a strategic deterrent to attack.

Are mobile users suckers for phishing attacks?

An examination of some phishing logs by a Web security company raises the question of why mobile users are more likely to take the bait.

Geotagged — you're it!

Location-aware applications on smart phones can come in handy, at times even saving lives. But you also could be sharing more information than you think.

The weak link in security: People

The human user is the first line of defense in cybersecurity but also a persistent weakness.

Did security predictions for 2010 come true?

Last year’s predictions for what to expect in 2010 were not too far off the mark.

Stuxnet story is high-profile but still out of reach

After six months of analysis, the celebrity worm’s makers, target and impact are still unknown, but that has not stopped the speculation.

The WikiLeaks lesson? It’s classified.

WikiLeaks didn't reveal much in the way of truly sensitive State Department information, but the kerfuffle over leaked documents did shed a revealing light on the government's policies for classifying documents.

WikiWars: The face of future conflicts

The attacks and counterattacks surrounding WikiLeaks might be the first real instance of cyber warfare, with the government launching its own unconventional type of strategic denial-of-service attacks.

How to get hired fast: Be a cyber pro

The shortage of skilled cybersecurity professionals is the result of complex problems that will take a while to correct. The good news, for those who qualify, is that it is likely to remain a growth field for some time.

In cyberspace, a good offense is NOT always the best defense

Stuxnet demonstrates the difficulties and dangers of offensive cyber warfare.