Cybersecurity
BitTorrent Protection
<a href="http://www.bittorrent.com/">BitTorrent</a> users, a free, open source peer-to-peer file-sharing application, might be wondering how to protect themselves. It's quite difficult to know when a download is masquerading as something it isn't. And while some might associate the tool with those who download illegal music, movie and software files, it's also used in legal ways. For example, users quite frequently download Linux distributions, some of which exist in DVD, a form that can only be obtained via BitTorrent.
Cybersecurity
Intell fusion centers need to set performance goals, GAO says
The intelligence fusion centers created for sharing intelligence information need to be evaluated on their performance, the GAO says.
Cybersecurity
Space agency is headed for new information security requirements
Bill would require NASA to provide progress reports on real-time computer monitoring systems; move comes amid effort to update policies governmentwide.
Cybersecurity
Out-of-Band Patch
Microsoft just published an out-of-band patch for its <a href="http://en.wikipedia.org/wiki/Active_Server_Pages">ASP</a> .NET vulnerability. The vulnerability allows for remote cracking of some encryption keys via an oracle vulnerability. Any system telling an attacker some fact about a piece of encrypted data is dubbed an "oracle."
Cybersecurity
IRS fails to assign employees security roles and responsibilities, audit finds
Inspector general concludes the agency did not develop day-to-day procedures and metrics for evaluating compliance with IT security requirements.
Cybersecurity
Results of cyber drill will help shape final version of response plan
Government, industry participants test procedures in simulated attack as officials put finishing touches on strategy.
Cybersecurity
State Cybersecurity Budgets Declining
Federal agencies maintain a lot of personal information on their computer networks and systems, but it's actually state governments that are the "custodians of the most comprehensive collection of citizens' personally identifiable Information," according to the National Association of State Chief Information Officers. And yet, 79 percent of state cybersecurity chiefs report stagnant or cut budgets, despite an increase in internal and external threats.
Cybersecurity
DHS tests cyber response plan in global drill
The Homeland Security Department began its second day of a three-day global cybersecurity exercise intended to test readiness for large-scale cyberattacks.
Cybersecurity
Feds' third cybersecurity exercise to attack content and identities
Cyber Storm III will use known hacker attacks to hijack certificates that verify content is legitimate and e-mails are authentic.
Cybersecurity
Army takes on acquisition, cyberspace and culture
The Army's cyber component's opening comes during unprecedented challenges in upgrading its IT services.
Cybersecurity
Lawmakers pressure DHS on financial modernization program
Two House Democrats have written the White House to criticize a Homeland Security Department financial system upgrade expected to cost as much as $1 billion.
Cybersecurity
Army awards $1.2 billion contract for NSA data center in Utah
The massive facility will support the federal Comprehensive National Cybersecurity Initiative to protect intelligence, Defense and civilian agencies' networks from cyberattacks.
Cybersecurity
Israel Targets Iran with Stuxnet Worm?
The Stuxnet computer worm - described as possibly the most dangerous malware because it can target and control specified industrial machinery - is thought to have been created in Israel to specifically target a nuclear power plant in Iran, reports the Guardian in London.
Cybersecurity
ESPN Fantasy Football Flaw
ESPN fantasy football players beware: The system is rife with security flaws. According to security experts, the vulnerabilities exist in the URL the site uses as a final confirmation when making roster decisions. The site is not authenticating the requests correctly, so by essentially editing the URL, a player can make changes to another player's team.
Cybersecurity