Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

Federal cyber incidents grew an astounding 1,300% between 2006 and 2015

“Federal information systems and networks are inherently at risk. They are highly complex and dynamic, technologically diverse, and often geographically dispersed. This complexity increases the difficulty in identifying, managing,...

09/22/16

Cisco Talos: Spam at levels not seen since 2010

Cisco Talos: Spam at levels not seen since 2010

“Many of the host IPs sending Necurs' spam have been infected for more than two years. To help keep the full scope of the botnet hidden, Necurs will only send spam from a subset of its minions. An infected host might be used for two...

09/21/16

Cisco discloses PIX firewall, IOS software security holes

Cisco discloses PIX firewall, IOS software security holes

Specifically Cisco said the vulnerability is due to “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests. An attacker could exploit this vulnerability by...

09/19/16

Small, low flying drones the target of newfangled DARPA defense system

Small, low flying drones the target of newfangled DARPA defense system

DARPA said it envisions its Aerial Dragnet program will develop technologies to deliver persistent, wide-area surveillance of all unmanned aircraft operating below 1,000ft., via a network of surveillance nodes. These nodes would...

09/16/16

Federal CISO’s define greatest challenges to authority

Federal CISO’s define greatest challenges to authority

The GAO said that 13 of the 24 agencies it reviewed – including the Departments of Defense, Commerce Energy, Justice and State-- for its report “had not fully defined the role of their CISO in accordance with these requirements. For...

09/15/16

Open source algorithm helps spot social media shams

Open source algorithm helps spot social media shams

“Given the rise in popularity of social networks and other web services in recent years, fraudsters have strong incentives to manipulate these services. On several shady websites, anyone can buy fake Facebook page-likes or Twitter...

09/08/16

 “Guccifer” gets 52 months in prison for hacking crimes

“Guccifer” gets 52 months in prison for hacking crimes

Guccifer hacked former U.S. Secretary of State Colin Powell as well as a the daughter of former President George H.W. Bush but lied about hacking into Hillary Clinton's email server

09/01/16

Researchers sport system to pull rare earth materials from used hard drives

Researchers sport system to pull rare earth materials from used hard drives

Open and easy access to rare earth materials -- which are critical parts of electronics in everything from cars to computers -- is still more a dream than reality. One of the ways to address that anxiety is to harvest and reuse such...

09/01/16

1,650lb 3D printed aircraft tool sets Guinness World Record

1,650lb 3D printed aircraft tool sets Guinness World Record

The 1,650 lb. apparatus known as a trim-and-drill tool is comparable in length to a large sport utility vehicle and will ultimately be tested for use in building the Boeing 777X passenger jet. Basically the tool will be used to...

08/31/16

FBI: Bank robbery? There’s an app for that

FBI: Bank robbery? There’s an app for that

The Bank Robbers application runs on iPhones and iPads (Apple iTunes) as well as Android smartphones (Google Play) and lets users sort bank robberies by the date they occurred, the category they fall under (i.e., armed serial bank...

08/19/16

Prize competitions for tough IT, high-tech problems all the rage

Prize competitions for tough IT, high-tech problems all the rage

It has been over six years that the government set the America Competes Act which in combination with Challenge.gov has prompted more than 700 public-sector prize competitions that have doled out more than $80 million in prizes.

08/16/16

Much ado about the ransomware scourge

Much ado about the ransomware scourge

“With alarming frequency, ransomware hackers are sneaking into consumer and business computers, encrypting files containing photos, documents and other important data, and then demanding a ransom in exchange for the key needed to...

08/15/16

What will space living look like? NASA picks 6 habitat prototypes

What will space living look like? NASA picks 6 habitat prototypes

NASA this week picked six companies to develop prototype deep space habitats that astronauts could somewhat comfortably live in on long space journeys – particularly to Mars. According to NASA, an effective habitat contains...

08/11/16

IT’S ALIVE! DARPA looks to build programmable, self-healing, living building materials

IT’S ALIVE! DARPA looks to build programmable, self-healing, living building materials

the Defense Advanced Research Projects Agency, this week announced a program that would combine the structural properties of traditional building ingredients with attributes of living systems to offer a class of living material that...

08/08/16

DARPA wants to build very low frequency wireless systems

DARPA wants to build very low frequency wireless systems

Wireless transmitters that operate at very or ultra low frequencies (0.3‐30 kHz) typically require some big antenna complexes to handle their communications. Scientists at the Defense Advanced Research Projects Agency (DARPA) said...

08/08/16

Feds need to do a better job of measuring telecommuting benefits

Feds need to do a better job of measuring telecommuting benefits

Watchdogs at the Government Accountability Office this week issued a report that found that many agencies “had little data to support the benefits or costs associated with their telework programs. All of the selected agencies could...

08/05/16

FAA authorizes private robotic space shot to the moon

FAA authorizes private robotic space shot to the moon

The Federal Aviation Administration this week granted permission to a privately-held space firm to launch a robotic spacecraft to the moon. Moon Express expects to launch its MX-1 spacecraft on a two-week mission to the lunar surface...

08/03/16

White House, NSF, NASA tout ambitious drone application plans

White House, NSF, NASA tout ambitious drone application plans

The National Science Foundation will devote $35 million in research funding over the next five years to accelerate the safe, intelligent, design and control of unmanned aircraft applications. The announcement was part of a...

08/02/16

Top VCE exec: We’re staying tight with Cisco

Top VCE exec: We’re staying tight with Cisco

There was an interesting exchange between IDG Chief Content Officer John Gallant and VCE President Chad Sakac in an interview Network World published today. In it, Gallant asked Sakac about the company’s converged infrastructure...

08/01/16

Cisco: Potent ransomware is targeting the enterprise at a scary rate

Cisco: Potent ransomware is targeting the enterprise at a scary rate

Enterprise targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits – nearly $34 million annually according to Cisco’s Mid-Year Cybersecurity Report out this week. Ransomware, Cisco...

07/27/16

Load More