Ridge Says U.S. Port Security on ScheduleU.S. seaports and ships are “in full compliance” with new international security requirements ahead of a July 1 deadline, Homeland Security Secretary Tom Ridge said yesterday, according to CNN.com. However, critics say the standards set by the International Ship and Port Facility Security Code and by a corresponding U.S. Maritime Transportation Security Act are minimal and large security holes remain, leaving U.S. shores vulnerable. The U.S. Coast Guard said it plans vigorous enforcement of the new regulations and will board every vessel, at sea or at the dock, on its first visit to a U.S. port on or after July 1, according to CNN.com. It also will take additional precautions or deny entry into U.S. waters for noncompliant vessels on a case-by-case basis.Hackers Strike Six Korean AgenciesThe Korea Times reports that the Korea Atomic Energy Research Institute, the Ministry of Maritime Affairs and Fisheries, the National Maritime Police Agency, and the Small and Medium Business Administration were also affected. The NCSC said in a statement, As soon as we discovered some government computers were contaminated by the Peep Trojan hacking program, we took emergency measures and currently there is no risk of data outflow.” The NCSC added it shut down the hackers’ posting site, distributed anti-virus programs and updated the anti-hacking system to prevent a recurrence of the dangerous incursion. The agency, however, failed to confirm whether or not confidential information was stolen from the invaded agencies before the presence of the virus was detected.The computer systems of six of Korean state agencies, including a pair of sensitive defense research institutes, were cracked by an anonymous hacker or hackers, according to the National Cyber Security Center (NCSC). Zeppieri to Command TSA SystemsGovernment Computer News, Zeppieri now is CIO of the Information Resources Management Division of Justices Office of Justice Programs, and will begin work at TSA in mid-July. The appointment makes sense considering what is going on with the IWIN program, an industry executive told GCN yesterday. IWIN is a major project to equip government officials with interoperable wireless systems and involves extensive cooperation between the Homeland Security Department and Justice. The Transportation Security Administration late yesterday said that it had chosen Justice Department systems executive David Zeppieri to be its CIO. According to a story in Network Associates for Sale, Sources SayGCN.com reports that Network Associates executives declined to comment and would neither confirm nor deny that the Santa Clara, Calif.-based company is for sale or planning layoffs. Microsoft is armed with a number of antivirus tools for Windows and is rolling out a next-generation application layer firewall, a VPN and a Web cache solution, says GCN.com. But possession of Network Associates’ extensive intellectual property would complete a security offering for Microsoft that could go head-to-head with Symantec, CA, Trend Micro and others. Microsoft representatives said it was policy not to comment on the company’s acquisition plans. The maker of McAfee antivirus and security products, Network Associates, has not made it public, but the company is apparently for sale, according to Wall Street sources and channel partners, and Microsoft is rumored to be the buyer. IBM Faces Critical Support Security HoleTechWorld describes the hole in some detail; it is similar in some ways to two linked flaws in Internet Explorer publicized earlier this month. Those flaws, like the new IBM one, allowed a malicious Web page to write files onto a user’s hard drive without being detected. In that case, the bug was already being exploited by Web pages in order to place spyware on users’ PCs. The earlier exploit also made use of a “help” file. TechWorld also reports that last week, Linux vendors began patching several new, but less serious holes in the 2.6 and 2.4 kernels and in the Gentoo and Debian distributions. Hackers could use two IBM ActiveX controls designed for automated PC support to attack PCs through the Internet Explorer browser, according to security firm eEye. A story in Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe