business security

Internet Pioneers, Security Experts Send Letter to Congress Blasting SOPA

A group of engineers, networking specialists, security experts and other specialists deeply involved with the Internet’s development and growth have sent a letter to lawmakers criticizing the highly controversial SOPA and PIPA bills and imploring them not to pass the legislation, which they say would stifle innovation and “threaten engineers who build Internet systems or offer services that are not readily and automatically compliant with censorship actions by the U.S. government.”

Researchers have known for years that virus writers and attackers pay close attention to the analyses researchers do of their work, and it appears that the Duqu authors are no exception. Shortly after the first public reports about Duqu emerged in early autumn, the crew behind Duqu wiped out all of the command-and-control servers that had been in use up to that point, including some that had been used since 2009.

Apple has informed developers that, as of March 2012, any app submitted to the Mac App Store will have to include a sandbox. The move is an intriguing one from Apple, which has kept a low profile on security and typically handles Mac security on its own.

The Poison Ivy malware kit is old. It was first seen in 2005, which makes it about 762 years old in Internet years. But that doesn’t mean it’s no longer useful, as evinced by the data collected by Microsoft in a new report on the tool, which shows that it is still in active use and is turning up on thousands of infected PCs.

The Linux Foundation has released a document outlining ways in which the UEFI secure boot specification can be used to support the installation of Linux and other open operating systems on UEFI-enabled hardware. As long as hardware vendors set up their systems in the proper way, UEFI should be no obstacle to using Linux or other alternate operating systems on forthcoming systems, they say.

WASHINGTON–The U.S. government has a lot of money. Not as much as it used to have, of course, but still, it has a lot. It also has a lot of computers and servers and routers and other things that move and store data. In fact, they have so many that they don’t really know what all of them are doing at any given time. That’s turning into a fairly thorny security problem for some of the country’s more vital networks, and even the most well-funded agencies are having a hard time addressing it.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.