Last May, German investigators found secret files embedded in a pornographic video on memory cards being carried by a suspected al Qaeda operative. Peter Wayner describes the history and technology of the technique for hiding information, known as steganography.
It's boom time for cybersecurity companies that specialize in going after Chinese hackers. The top competitors in the sector have been taking a nontraditional approach. Instead of focusing on protecting clients from malware, these firms are learning more about the attackers — and going after them.
For the top brass of companies such as Dell and Hewlett-Packard, talk of cyberweapons and cyberwar could be abstract. But at a classified security briefing in spring 2010, it suddenly became quite real. "We can turn your computer into a brick," government officials reportedly told the startled executives.
With a raft of cybersecurity proposals under consideration in Congress, the U.S. business community is making increasingly clear that it opposes new regulations that would require private companies to adhere to minimum performance standards or report all cyber intrusions they experience to the government.
When you give to WAMU, your tax-deductible membership gift helps make possible award-winning programs such as Morning Edition, All Things Considered, The Diane Rehm Show, The Kojo Nnamdi Show, and other favorites.