Top High-Performance Computers by TeraFLOPS

Top High-Performance Computers by TeraFLOPS

Die weltweit leistungsfähigsten Rechnersysteme werden als Supercomputer bezeichnet. Die meisten dieser digitalen Giganten finden ihren Einsatz in der Industrie. Hier berechnen sie u.a. komplexe Simulationen. Die Infografik von Statista zeigt die Rechenleistung der leistungsstärksten Supercomputer weltweit im November 2018. Der Rechner “Summit” vom Hersteller IBM erzielt eine Leistung von rund 143.500 TeraFLOPS (21,23 Billiarden FLOPS,…

Attackers Use Steganography to Obfuscate PDF Exploits

Attackers Use Steganography to Obfuscate PDF Exploits

By Ionut Arghire on January 24, 2019 A recently discovered PDF exploit used steganography to hide malicious JavaScript code in images embedded in PDF files, according to exploit analysis firm EdgeSpot. Steganography is a method of hiding information within files, and has been long used by cybercriminals in malicious attacks. The powerful exploit obfuscation technique…

DARPA’s “R3D2” Array – Radio-Frequency Risk Reduction Deployment Demonstration Satellite

DARPA’s “R3D2” Array – Radio-Frequency Risk Reduction Deployment Demonstration Satellite

R3D2 (not: R2D2) … laying the groundwork for a revolutionary global space-based internet, validating a resilient sensor and data transport layer in low Earth orbit   New Zealand-based space company Rocket Lab said it plans to launch a satellite for the Defense Advanced Research Projects Agency (DARPA) next month from the company’s main launch complex…

Wie gut ist Deutschlands Cyber-Behörde?

Wie gut ist Deutschlands Cyber-Behörde?

von JOANA EKRUTT und CHRISTIAN UNGER — DIENSTAG, 22. JANUAR 2019 | BERLINER MORGENPOST   “Der Raum, in dem Deutschland seinen Kampf gegen Hacker und Cyberkriminelle gewinnen will, ist gerade so groß wie ein Klassenzimmer.” “Die deutsche Cyberabwehr ist ein Flickenteppich. Neben dem BSI haben Polizei und Nachrichtendienste eigene Cyber-Abteilungen, in München arbeitet ein Zentrum…

Phishing: Hacking the USA Power Grid

Phishing: Hacking the USA Power Grid

The kill chain, the phishing attack and the broken trust graph Anshu Sharma – Jan 17, 2019 The Wall Street Journal published an explosive story about how state-sponsored Russian hackers used a variety of techniques and a spider web of compromised accounts to ultimately gain access to the control infrastructure that monitors and controls the flow…

“GAPS”: DARPA Explores New Computing Architectures to Deliver Verifiable Data Assurances

“GAPS”: DARPA Explores New Computing Architectures to Deliver Verifiable Data Assurances

Program seeks to create new software and hardware architectures that provide physically provable assurances around data security and privacy outreach@darpa.mil – 1/16/2019 DARPA created the Guaranteed Architecture for Physical Security (GAPS) program to develop scalable solutions that provide safe, verifiable methods of tracking information and communications between computer systems. The goal of GAPS is to…

Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware

Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware

GRIM SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER, a criminal enterprise of which GRIM SPIDER appears to be a cell. The WIZARD SPIDER threat…

DARPA probes tech to solve supply chain uncertainty

DARPA probes tech to solve supply chain uncertainty

By Derek B. Johnson – Jan 10, 2019 The US federal government is worried about possible consequences of vulnerabilities in the global electronics and IT supply chain. The Department of Homeland Security and the intelligence community are leading efforts to persuade tech companies to fundamentally alter the way they do business to better protect the…

The United States and China – A Different Kind of CyberWar

The United States and China – A Different Kind of CyberWar

By Kevin Townsend on January 07, 2019 China is Conducting a Low and Slow Cyberwar, Attempting to Stay Under the Radar and Maneuver the Global Economy The potential for cyberwarfare between the United States and Russia is openly discussed, and – if not actually defined – is well understood. The British attitude is clear and…

Kampf gegen Cyber-Crime: warum dem Bund die IT-Experten ausgehen

Kampf gegen Cyber-Crime: warum dem Bund die IT-Experten ausgehen

Laut McAfee Deutschlandchef fehlen bis zum Jahr 2020 etwa 160.000 Sicherheitsspezialisten.   Berlin will für mehr Cybersicherheit sorgen. Allein das Bundesamt für Sicherheit in der Informationstechnik soll 350 neue Stellen erhalten. Nur: Woher sollen die Fachkräfte kommen? das Bundeskriminalamt, das Kommando Cyber- und Informationsraum der Bundeswehr (KdoCIR), die zentrale Stelle für Informationstechnik im Sicherheitsbereich (ZITIS),…

Massive German hack: 20-year-old admits mass doxing politicians, journalists, celebs

Massive German hack: 20-year-old admits mass doxing politicians, journalists, celebs

(Vlad’s comment nails it.)   Police have found the likely culprit of last week’s big leak of high-profile personal data. A 20-year-old German man has confessed to being the culprit behind the massive leak of German politicians’, journalists’, and celebrities’ personal data that shocked the country’s political class last week. Police raided the central Hesse house…