colinneagle writes: Open Source guy Bryan Lunduke has experienced the difficulties of migrating a successful closed source project to an open license first-hand, but still believes — or at least wants to believe — that it can be done.
Case in point: LiveCode's new Kickstarter campaign to raise about $550,000 to help put their Hyper-Card-like software development tool for Linux, Windows and Mac under an open license.
At the time this was written, they were roughly 20% of the way to their fund-raising goal with 22 days left. So it seems tight...but entirely possible.
The question is, will it be successful in the long term even if it reaches its Kickstarter goal?
One of the key problems is that virtually any attack tool could be defined as a cyberweapon, depending upon the context, the target and the attacker. Certainly tools such as Duqu fall into that category, but so might simple remote-access Trojans under certain circumstances. Who makes that call? Right now, it's mainly made by either the victim or a security researcher on the outside.
"There's no definition of cyberweapons. What's the difference between cyberweapons and traditional ones?" said Eugene Kaspersky, CEO of Kaspersky Lab, in a discussion on Tuesday. "One difference is software is software. People can make a copy, disassemble it, learn its tricks."
Mephistophocles writes: A chilling article by Darkreading's Kelly Jackson Higgins describes how the growing accessibility of hacking tools like RAT's (Remote Access Trojans) have made cyber-espionage possible for more than just those financially backed by large nation-states, and speculates on what the implications of this may be:
"Researchers at Norman Security today revealed that they recently analyzed malware used in phishing emails targeting Israeli and Palestinian targets and found that attackers used malware based on the widely available Xtreme RAT crimeware kit. The attacks, which first hit Palestinian targets, this year began going after Israeli targets, including Israeli law enforcement agencies and embassies around the world. Norman says the same attacker is behind the attacks because the attacks use the same command-and-control (C&C) infrastructure, as well as the same phony digital certificates.
This attack campaign just scratches the surface of the breadth and spread of these types of attacks around the world as more players have been turning to cyberspying. "We're just seeing the tip of the iceberg," says Einar Oftedal, deputy CTO at Norman."
Hugh Pickens writes writes: "Ken Murray, a Clinical Assistant Professor of Family Medicine at USC, writes that it's not a frequent topic of discussion, but doctors die, too. But they don’t die like the rest of us because what’s unusual about doctors is not how much treatment they get compared to most Americans, but how little. For all the time they spend fending off the deaths of others, they tend to be fairly serene when faced with death themselves. "Almost all medical professionals have seen what we call “futile care” being performed on people," writes Murray. "What it buys is misery we would not inflict on a terrorist. I cannot count the number of times fellow physicians have told me, in words that vary only slightly, 'Promise me if you find me like this that you’ll kill me.'" Feeding into the problem are unrealistic expectations of what doctors can accomplish. Many people think of CPR as a reliable lifesaver when, in fact, the results are usually poor. "If a patient suffers from severe illness, old age, or a terminal disease, the odds of a good outcome from CPR are infinitesimal, while the odds of suffering are overwhelming. Poor knowledge and misguided expectations lead to a lot of bad decisions.""
omnichad writes: "The Email Standards Project just launched a massive Twitter campaign, begging Microsoft not to use the Word rendering engine in Outlook 2010. As it stands, Word 2010 will continue the tradition of painful HTML email design for those of us who create HTML emails for a living. Another several years of tables and almost no CSS support."
Ponca City, We Love You writes: "Robert Scoble had an interesting post on his blog a few days ago on obsolete technical skills — "things we used to know that no longer are very useful to us." Scoble's initial list included dialing a rotary phone, using carbon paper to make copies, and changing the gas mixture on your car's carburetor. The list has now been expanded into a wiki with a much larger list of these obsolete skills that includes resolving IRQ conflicts on a mother board, assembly language programming, and stacking a quarter on an arcade game to indicate you have next. "Feel free to contribute more if you can, and if you have the time, please make a page with a short description of the skill," writes Brad Kellett."