Morning Security Brief: White House Announces Cybersecurity Plan, TWIC Fails a Test, and DHS Must Keep Accurate Records

The Obama Administration launches its new cybersecurity plan, the government's port security credential is questioned, and the government can be held liable for keeping inaccurate computer records.

Canada Becoming Cyber Criminal Breeding Ground

Canada is becoming a hotspot for cybercriminals.

Online Service Providers Must Strengthen Security to Counter Hackers

Online service providers need to bulk up on security or risk a major loss of customers.

White House Releases Plan to Protect Identities and Grow Businesses Online

The Obama administration today unveiled its strategy to safeguard transactions in cyberspace by helping to create voluntary "secure, efficient, easy-to-use, and interoperable identity solutions."

Social Media Attacks on the Rise

Hackers are increasingly using social networking sites to spread malware, according to Symantec’s 2011 Internet Security Threat report.

China and Thailand Leaders in Dirty Computers

More than 60 percent of computers in China and Thailand are infected with malware, according to a new report.

Morning Security Brief: Politics at DHS, Afghan Insurgency, and Federal Cyberattacks

The Department of Homeland Security's own inspector finds political pressures in Freedom of Information requests. The Wall Street Journal examines the source of UN killings in Afghanistan, and the latest report shows sharp rise in cyberattacks against federal computers. And more.

Public-Private Partnerships Pay off in Cybersecurity

A broad coalition of business, civil liberties, and internet security groups has issued a white paper supporting the continued use of public-private partnerships to fight cybercrime rather than go in a more government-led direction.

Attackers Exploit Trust in PDFs

Hackers have grown increasingly attracted to using PDF attachments to carry out targeted cyberattacks, cautions a new cybersecurity report.

Cybercriminals Shifting Focus

A new report on cybercrime finds that criminals are shifting focus from Windows-based computers to smart phones and non-Windows platforms.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.