Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
US says cybersecurity sharing not an antitrust issue
by Staff Writers
Washington (AFP) April 10, 2014


US officials announced Thursday that companies sharing information about cybersecurity would not face prosecution on antitrust grounds.

The news came amid heightened concerns about data breaches and malware that can foil online encryption to allow hackers to steal passwords or other personal data.

Officials at the Justice Department and Federal Trade Commission said they issued formal guidance telling companies that there would be no antitrust issues from the sharing of technical information about cyber attacks, malware or similar threats.

"Some companies have told us that concerns about antitrust liability has been a barrier to being able to openly share cyber threat information with each other. We have heard them," Deputy Attorney General James Cole told reporters.

"And speaking on behalf of everyone here today, this guidance responds to those concerns, lets everyone know that antitrust concerns should not get in the way of sharing cybersecurity information, and signals our continued commitment to expanding the sharing of cybersecurity information."

FTC chairwoman Edith Ramirez, who joined the announcement, noted that "the antitrust laws are not an impediment to the legitimate sharing of cybersecurity threat information among private businesses."

The news came amid concerns about malware circulating on the Internet called Heartbleed which could circumvent encryption and allow attackers to illicitly retrieve passwords and other bits of information from working memory on computer servers.

It also comes months after the revelation of a data breach at US retailer Target which may have exposed personal information of as many as 110 million consumers

Rand Beers, a White House homeland security aide, said the new policy would encourage companies to develop a common defense against attacks such as "phishing," which are emails whose origin is disguised in an effort to obtain login information.

"If companies are sharing information with each other, detection by one company means that other companies can be prepared to face the same threat," Beers said.

Cole said the US administration still backs legislation on cybersecurity that would enable greater sharing of threat information between government and industry, and standards for reporting of incidents.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Cuba plans own social media sites after US row
Havana (AFP) April 09, 2014
Cuba plans to launch its own social media networks to counter "subversive" ones such as a Twitter-like app the United States was funding, an official said Wednesday. Last week, the White House acknowledged the existence between 2009 and 2012 of "ZunZuneo," which was set up by USAID so that Cubans, who face strict curbs on expression, could "talk freely among themselves" on their cell phones. ... read more


CYBER WARS
US to send two more missile defence ships to Japan: Hagel

Russia's new S-500 system to destroy any target at any altitude

Britain, France give MBDA missile development contract

US gains additional protection against ballistic missiles

CYBER WARS
South Korea seeking Sidewinder missiles from U.S.

US, UK parts in North Korea rocket

Britain, France sign anti-ship missile deal

Approval given for Griffin missile launch system

CYBER WARS
Global Hawk Expands Satellite Communications Capability

Pentagon to organize drones in teams for sharing data, fighting together

'StratoBus' drone-satellite hybrid to provide new level of surveillance

Northrop Grumman, US Navy Complete Initial Flight Testing of the Triton Unmanned Aircraft System

CYBER WARS
NGC Ships Payload Module For 4th Advanced EHF Protected ComSat

Fourth AEHF Protected Communications Satellite Begins Integration Months Ahead of Schedule

Testing Begins on Third AEHF Satellite

Northrop Grumman Flies First Production Smart Node Pod

CYBER WARS
Military selects BAE Systems cross-domain application

Britain taps BAE Systems for illumination artillery shells

Alion Science to help counter-IEDs

DARPA Launches Biological Technologies Office

CYBER WARS
Volvo suspends Russia tank project over Ukraine 'uncertainty'

British defence minister in Saudi talks

Japan orders Australian armored vehicles

Eighteen countries ratify UN treaty on arms trade

CYBER WARS
Russian marine kills Ukrainian officer: Kiev

New China envoy tries to mend fences with Philippines

Japan fighter jet dispatch highest since Cold War

Pentagon chief's visit exposes US-China divide

CYBER WARS
Never say never in the nano-world

Nanosheets and nanowires

Fabricating Nanostructures with Silk Could Make Clean Rooms Green Rooms

Scientists watch nanoparticles grow




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.