Introducing Strongbox; Open-Source Tools at The New Yorker

110_ny_strongox

From NewYorker.com | May 15, 2013 | by Amy Davidson “This morning, The New Yorker launched Strongbox, an online place where people can send documents and messages to the magazine, and we, in turn, can offer them a reasonable amount of anonymity. It was put together by Aaron Swartz, who died in January, and Kevin […]

China Cyberspies Outwit U.S. Stealing Military Secrets

110_china_hack

Among defense contractors, QinetiQ North America (QQ/) is known for spy-world connections and an eye- popping product line. Its contributions to national security include secret satellites, drones, and software used by U.S. special forces in Afghanistan and the Middle East. Former CIA Director George Tenet was a director of the company from 2006 to 2008 […]

CISPA Add-On Banning Employers from Seeking Facebook Passwords Killed

facebook_110

As you probably know, on Thursday the U.S. House of Representatives passed the Cyber Intelligence Sharing and Protection Act, better known as CISPA. The bill, which aims to help the government react to cybersecurity threats by making it easier to share information between itself and private companies, saw bipartisan support. Opponents of CISPA have argued […]

DDoS Attack Bandwidth Jumps 718%

110_ddos

The average bandwidth seen in distributed denial-of-service (DDoS) attacks has recently increased by a factor of seven, jumping from 6 Gbps to 48 Gbps. Furthermore, 10% of DDoS attacks now exceed 60 Gbps. Those findings come from a new report released Wednesday by DDoS mitigation service provider Prolexic Technologies, which saw across-the-board increases in DDoS […]

Time To Dump Antivirus As Endpoint Protection?

110_antivirus

Attackers find it easy to avoid signature- and heuristic-based anti-malware defenses. Experts recommend alternatives to antivirus programs be used alongside them, not in lieu of them. The shortcomings of antivirus software are well known in the security industry, where the programs are typically considered an eminently fallible last line of defense. When Google analyzed, for […]

House passes FISMA update, cyber training bills

capital_110

Security standards for federal computer networks would get a spring cleaning under a bill passed by the House on April 16. The Federal Information Security Amendments Act of 2013 updates the Federal Information Security Management Act of 2002 and makes the director of the Office and Management and Budget responsible for overseeing the security of […]