Cybersecurity

BitTorrent Protection

<a href="http://www.bittorrent.com/">BitTorrent</a> users, a free, open source peer-to-peer file-sharing application, might be wondering how to protect themselves. It's quite difficult to know when a download is masquerading as something it isn't. And while some might associate the tool with those who download illegal music, movie and software files, it's also used in legal ways. For example, users quite frequently download Linux distributions, some of which exist in DVD, a form that can only be obtained via BitTorrent.

Cybersecurity

Intell fusion centers need to set performance goals, GAO says

The intelligence fusion centers created for sharing intelligence information need to be evaluated on their performance, the GAO says.

Cybersecurity

Space agency is headed for new information security requirements

Bill would require NASA to provide progress reports on real-time computer monitoring systems; move comes amid effort to update policies governmentwide.

Cybersecurity

Out-of-Band Patch

Microsoft just published an out-of-band patch for its <a href="http://en.wikipedia.org/wiki/Active_Server_Pages">ASP</a> .NET vulnerability. The vulnerability allows for remote cracking of some encryption keys via an oracle vulnerability. Any system telling an attacker some fact about a piece of encrypted data is dubbed an "oracle."

Cybersecurity

IRS fails to assign employees security roles and responsibilities, audit finds

Inspector general concludes the agency did not develop day-to-day procedures and metrics for evaluating compliance with IT security requirements.

Cybersecurity

Results of cyber drill will help shape final version of response plan

Government, industry participants test procedures in simulated attack as officials put finishing touches on strategy.

Cybersecurity

State Cybersecurity Budgets Declining

Federal agencies maintain a lot of personal information on their computer networks and systems, but it's actually state governments that are the "custodians of the most comprehensive collection of citizens' personally identifiable Information," according to the National Association of State Chief Information Officers. And yet, 79 percent of state cybersecurity chiefs report stagnant or cut budgets, despite an increase in internal and external threats.

Cybersecurity

DHS tests cyber response plan in global drill

The Homeland Security Department began its second day of a three-day global cybersecurity exercise intended to test readiness for large-scale cyberattacks.

Cybersecurity

Feds' third cybersecurity exercise to attack content and identities

Cyber Storm III will use known hacker attacks to hijack certificates that verify content is legitimate and e-mails are authentic.

Cybersecurity

A DNI Legal Leak

Cybersecurity

Army takes on acquisition, cyberspace and culture

The Army's cyber component's opening comes during unprecedented challenges in upgrading its IT services.

Cybersecurity

Lawmakers pressure DHS on financial modernization program

Two House Democrats have written the White House to criticize a Homeland Security Department financial system upgrade expected to cost as much as $1 billion.

Cybersecurity

Army awards $1.2 billion contract for NSA data center in Utah

The massive facility will support the federal Comprehensive National Cybersecurity Initiative to protect intelligence, Defense and civilian agencies' networks from cyberattacks.

Cybersecurity

Israel Targets Iran with Stuxnet Worm?

The Stuxnet computer worm - described as possibly the most dangerous malware because it can target and control specified industrial machinery - is thought to have been created in Israel to specifically target a nuclear power plant in Iran, reports the Guardian in London.

Cybersecurity

BAE Systems wins $40M FBI cyber job

Washington Business Journal

Cybersecurity

Workforce is DoD's biggest cyber challenge

Federal News Radio

Cybersecurity

ESPN Fantasy Football Flaw

ESPN fantasy football players beware: The system is rife with security flaws. According to security experts, the vulnerabilities exist in the URL the site uses as a final confirmation when making roster decisions. The site is not authenticating the requests correctly, so by essentially editing the URL, a player can make changes to another player's team.

Cybersecurity

DHS gets average grade on public transit info sharing

The Homeland Security Department could do a better job of streamlining the security information flow to public transit agencies, according to a new GAO report.