IDG News Service - Russia and the U.S. are working to reduce chances for a cybersecurity incident that could damage the countries' relationship, according to the top cybersecurity adviser to U.S. President Barack Obama.
Howard Schmidt, the White House cybersecurity adviser, wrote about a recent meeting with Russian officials where the two countries agreed to exchange technical information on problems such as botnets and have "crisis prevention" communications links by the end of the year.
"Both the U.S. and Russia are committed to tackling common cybersecurity threats while at the same time reducing the chances a misunderstood incident could negatively affect our relationship," Schmidt wrote on the White House blog.
Schmidt's announcement comes as the U.S. has tried since 2009 to "reset" its relationship with Russia following increasing tension on defense issues.
Russia's strength in computer science has also led to a dark side, with hackers writing and selling malware designed to steal money from online bank acconts. Computer security experts have said the country is not as forthright as others when it comes to cooperating on cross-border cybercrime investigations.
But researchers have seen some surprising movements and actions as of late by Russia, said Roel Schouwenberg, senior researcher with Kaspsersky Lab, a Russian antivirus company based in Moscow. He cited the arrest last month of Pavel Vrublevsky, co-founder of ChronoPay, an online payment processor linked with processing payments for companies that sell fake antivirus software and pharmaceuticals on the Internet.
"I think what we have been seeing so far are all positives," Schouwenberg said. "Going by that, I think we are moving in a good direction. Governments never move fast."
Russia has not signed the Council of Europe's Convention on Cybercrime, the only international treaty that promotes harmonized computer crime legislation across different countries and contact points for law enforcement available 24 hours a day.
Countries outside the 47-member Council, which represents European countries, may apply for accession, the first step in implementing the treaty. The U.S. has ratified the treaty.
However, only recently have countries that are traditionally allies been linked up better for cross-border law-enforcement actions, Schouwenberg said. "I think the fact that Russia now is going to work more closely with the U.S. is obviously a good thing. It can only be applauded," he said.
Send news tips and comments to firstname.lastname@example.org
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Red Hat Enterprise Linux - The Original Cloud Operating System
- Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse
- Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center
- Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper
- Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support... All Government IT White Papers
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- All Government IT Webcasts