IDG News Service - Russia and the U.S. are working to reduce chances for a cybersecurity incident that could damage the countries' relationship, according to the top cybersecurity adviser to U.S. President Barack Obama.
Howard Schmidt, the White House cybersecurity adviser, wrote about a recent meeting with Russian officials where the two countries agreed to exchange technical information on problems such as botnets and have "crisis prevention" communications links by the end of the year.
"Both the U.S. and Russia are committed to tackling common cybersecurity threats while at the same time reducing the chances a misunderstood incident could negatively affect our relationship," Schmidt wrote on the White House blog.
Schmidt's announcement comes as the U.S. has tried since 2009 to "reset" its relationship with Russia following increasing tension on defense issues.
Russia's strength in computer science has also led to a dark side, with hackers writing and selling malware designed to steal money from online bank acconts. Computer security experts have said the country is not as forthright as others when it comes to cooperating on cross-border cybercrime investigations.
But researchers have seen some surprising movements and actions as of late by Russia, said Roel Schouwenberg, senior researcher with Kaspsersky Lab, a Russian antivirus company based in Moscow. He cited the arrest last month of Pavel Vrublevsky, co-founder of ChronoPay, an online payment processor linked with processing payments for companies that sell fake antivirus software and pharmaceuticals on the Internet.
"I think what we have been seeing so far are all positives," Schouwenberg said. "Going by that, I think we are moving in a good direction. Governments never move fast."
Russia has not signed the Council of Europe's Convention on Cybercrime, the only international treaty that promotes harmonized computer crime legislation across different countries and contact points for law enforcement available 24 hours a day.
Countries outside the 47-member Council, which represents European countries, may apply for accession, the first step in implementing the treaty. The U.S. has ratified the treaty.
However, only recently have countries that are traditionally allies been linked up better for cross-border law-enforcement actions, Schouwenberg said. "I think the fact that Russia now is going to work more closely with the U.S. is obviously a good thing. It can only be applauded," he said.
Send news tips and comments to email@example.com
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Top 10 Endpoint Backup Mistakes
- When considering endpoint backup options, be sure you're making the right decisions. Protecting data on endpoints has become more challenging because of recent...
- Transforming Security: Designing a State-of-the-Art Extended Team
- The information security mission is no longer about implementing and operating controls.
- The Big Data Security Analytics Era Is Here
- New security risks and old security challenges often overwhelm legacy security controls and analytical tools.
- Building an Intelligence-Driven Security Operations Center
- The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts