Cyber- / ExoWarfare Blog

To keep a record of relevant news for myself in these four categories,
Blockchain
Cyber/ExoWarfare HyperWarfare Quantum Computing
I am re-posting those here. Scroll down to access the Cyber/ExoWarfare posts.

Too many people ask me about technical and business insights to give them all a decent, in-depth answer: this way I can refer them here for a lot of that, giving them at least a start on the topic (and as a freebie). I do not offer these posts as e-Mail subscriptions. Of course, all sources are clearly marked and mentioned.

 

Cyber Terrorism Concept.

 

John Carmack steps down at Oculus to pursue AI passion project ‘before I get too old’ -- 14 Nov 2019 - His plan is to pursue it from home, “Victorian Gentleman Scientist” style Legendary coder John Carmack is leaving Facebook’s Oculus after six years to focus on a personal project — no less than the creation of Artificial General Intelligence (AGI), or “Strong AI.” He’ll remain attached to the company in… ... Read More
Programming languages: Python overtakes Java on GitHub as Google Dart use soars -- 14 Nov 2019 - Developers love Python, Microsoft's GitHub says, also revealing the site's biggest open-source projects. The hit programming language Python has climbed over once-dominant Java to become the second most popular language on Microsoft-owned open-source code-sharing site GitHub. Python now outranks Java based on the number of repository contributors, and by that… ... Read More
Google reveals ‘Project Nightingale’ after being accused of secretly gathering personal health records -- 14 Nov 2019 - By Mary Beth Griggs - Nov 11, 2019 Google secretly gathered millions of patient records across 21 states on behalf of a health care provider, in an effort dubbed “Project Nightingale,” reports The Wall Street Journal. Neither the provider’s doctors nor patients were made aware of the effort, according to… ... Read More
Here’s how US Cyber Command is using ‘defend forward’ -- 13 Nov 2019 - U.S. Cyber Command is using new authorities to gain insights and access to foreign networks to help better inform defense. (U.S. Cyber Command Public Affairs) U.S. Cyber Command is gaining important insights into malware and adversarial actors by working with partner nations to help secure their systems, according to a… ... Read More
BKA verzeichnet Anstieg der Cyberkriminalität -- 11 Nov 2019 - Jeder zweite Befragte zu Beginn des Jahres veröffentlichten Bitkom-Umfrage gab an, in den letzten zwölf Monaten Opfer von Internetkriminalität geworden zu sein. Deutschlandweit registrierte das Bundeskriminalamt allein durch Computerbetrug und missbräuchliche Nutzung von Telekommunikationsdiensten Schäden in Höhe von 61,4 Millionen Euro - dabei dürfte es sich aber nur um einen… ... Read More
Wie Geheimdienste Cyberattacken durchführen -- 11 Nov 2019 - Symbolbild, echte Geheimagenten tragen natürlich Schlapphüte. Ein Ex-FBI-Agent spricht über staatliche und nichtstaatliche Cyberangriffe, deren Zuschreibung und den Sony-Pictures-Hack. Von Sylvester Tremmel Wie gehen Geheimdienste gegen Cyber-Attacken vor und wie führen sie selber solche Angriffe durch? Auf dem Web Summit in Lissabon hat Andre McGregor (LinkedIn) darüber etwas aus dem… ... Read More
Weaponizing Blockchain — Vast Potential, but Projects Are Kept Secret -- 09 Nov 2019 - When Indian Defense Minister Rajnath Singh said that blockchain and artificial intelligence would “revolutionize war,” as Cointelegraph reported on Nov. 4, did he take things a bit too far? Jet engines have revolutionized warfare, and so have missiles and nuclear weapons — but shared digital ledgers? Former NATO Secretary General… ... Read More
Cybersecurity Workforce Gap: 145% Growth Needed to Meet Global Demand -- 08 Nov 2019 - 805,000 Cybersecurity Professionals Are Currently Estimated to be Working in the U.S., Study Finds The biggest surprise about the cybersecurity skills gap is that it exists at all. The job description painted by the latest (ISC)2 workforce study, based on responses from 3,237 existing cybersecurity professionals, is attractive. The pay… ... Read More
Kepler achieves a world-first for satellite broadband with 100Mbps connection to the Arctic -- 08 Nov 2019 - Small-satellite startup Kepler has done something never before accomplished with satellite-based broadband connectivity: providing a high-bandwidth to the Arctic. Kepler’s nanosatellites have successfully demonstrated achieving over 100Mbps of network speed to a German icebreaker sea vessel that acts as a mobile lab for the MOSAiC research expedition. This is the… ... Read More
South African Naspers retains a 31% stake in Tencent that is valued at around $100 billion -- 08 Nov 2019 - Naspers CEO Bob van Dijk - his other new holding company for tech investments, Prosus NV, is currently valued at $114 billion after going public. South African internet company Naspers isn’t a particularly well-known name in the startup community. And yet, the company made an early investment in a small… ... Read More
How the US Air Force plans to find ‘Defense Unicorns’ -- 07 Nov 2019 - Dr. Will Roper, Assistant Secretary of the Air Force for Acquisition, Technology and Logistics, said he wants to "start making defense unicorns." (Alan Lessig/Staff) Dozens of space companies descended on San Francisco, California Nov. 5 for a unique opportunity: the chance to walk away with a same day contract with… ... Read More
Alike DARPA: Schumer proposes $100B US-tech ‘Moon Shot Agency’ versus China -- 06 Nov 2019 - Sen. Chuck Schumer is calling for a new, deep-pocketed agency to fund cutting-edge tech development. WASHINGTON ― With an eye on China, the U.S. Senate’s top Democrat is floating plans for a new, deep-pocketed agency to invest $100 billion into cutting-edge technologies like artificial intelligence, quantum computing, robotics and fifth-generation… ... Read More
“Flock 93” is Russia’s dream of a 100-strong drone swarm for war -- 06 Nov 2019 - We do not yet know what VTOL flying wing will be the basis for the Flock-93 swarm. The Takhion, seen here, can be hand-launched. (Ministry of Defence) At a security exposition in Moscow in late October, researchers from Russia’s oldest Air Force academy presented a vision of the future of… ... Read More
So finden Sie ganz leicht den Besitzer einer unbekannten Handynummer heraus -- 06 Nov 2019 - Wer regelmäßig unbekannte Anrufer hat, sollte im Netz recherchieren, wer dahinter steckt   Schon wieder ein unbekannter Anrufer auf dem Smartphone? Das kann ganz schön nerven: Ist es vielleicht ein Freund mit einer neuen Nummer – oder doch nur wieder der lästige Hotline-Mitarbeiter des Mobilfunkanbieters, der einen neuen Vertrag anpreisen… ... Read More
Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam -- 05 Nov 2019 - Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands. Researchers have discovered a new way to hack Alexa and Siri smart speakers merely by using a laser light beam. No physical access of the victims’ device, or owner interaction, is needed to launch… ... Read More
So what problems does the US DoD JEDI Cloud solve, really? -- 31 Oct 2019 - The DoD wants the JEDI cloud to consolidate data for use by the warfighter at the tactical edge. Joint Enterprise Defense Infrastructure program In the months leading up to the Department of Defense awarding Microsoft a multibillion-dollar cloud computing contract, the Pentagon’s senior leaders described pent up demand for a… ... Read More
The hidden value in the US Department of Defense’s Comply-to-Connect program -- 31 Oct 2019 - As DoD moves forward with adopting the framework to implement a C2C solution, it should also take into account a goldmine that offers a trove of value for defense agencies. (Jackie Niam/Getty Images) By Bill Wright The increased attack surface born from the digital age has caused the security threat… ... Read More
Murky Details Surround Bed, Bath and Beyond Breach -- 31 Oct 2019 - The housewares giant disclosed a breach with few details – but security researchers have some theories. Housewares and home furnishings purveyor Bed, Bath and Beyond has disclosed a data-thieving cyber attack that allowed the adversaries to access customers’ online accounts. According to a Tuesday SEC filing, the company “discovered that… ... Read More
Breaches at NetworkSolutions, Register.com, and Web.com -- 31 Oct 2019 - A notice to customers at notice.web.com Top domain name registrars NetworkSolutions.com, Register.com and Web.com are asking customers to reset their passwords after discovering an intrusion in August 2019 in which customer account information was accessed. “On October 16, 2019, Web.com determined that a third-party gained unauthorized access to a limited… ... Read More
Cybercriminals Impersonate Russian APT ‘Fancy Bear’ to Launch DDoS Attacks -- 29 Oct 2019 - Attacks are targeting international companies in the financial sector, demanding that victims pay ransom in Bitcoin. Cybercriminals posing as the Russian APT group Fancy Bear have been launching DDoS attacks against companies in the financial sector and demanding ransom payments, according to a new report. The large-scale, multi-vector DDoS attacks… ... Read More
CACI SkyTracker: a drone killer US troops have taken overseas -- 29 Oct 2019 - An ISIS unmanned aerial vehicle captured by Iraqi federal police rests on a table at an intelligence-sharing key leader engagement at the Joint Operations Center, at Qayyarah West Airfield, Iraq. (Jason Hull/Army) Videos from battlefields in Iraq, Syria and Ukraine have shown the potential havoc that small drones can bring… ... Read More
Analysts predict counterdrone market will top $2B -- 28 Oct 2019 - Drone mitigated using a Marine Air Defense Integrated System (MADIS) (Jack C. Howell / Marine Corps) The three biggest obstacles facing the counterdrone market are the law, the nature of the threat, and the technology itself. In fairness, those are obstacles to the adoption of most any national security technology.… ... Read More
SSRF: Is AWS Liable in the 100-Million-Customer 2019 Capital One Breach? -- 26 Oct 2019 - "Everything has been hacked and will continue to get hacked - except the Bitcoin PoW Blockchain." - TJACK "And: instead of pointing fingers between Amazon AWS and Capital One, would it not be better to have a system which cannot be compromised in the first place?" - TJACK Senators penned… ... Read More
Immer mehr Kleinsatelliten im All -- 25 Oct 2019 - Im Weltall wird es immer voller: Neben den herkömmlichen Satelliten werden immer mehr Kleinsatelliten ins All geschickt. Nun hat SpaceX-Chef Elon Musk angekündigt, weitere 30.000 Satelliten entsenden zu wollen, um eine lückenlose Internetversorgung weltweit zu erreichen - zusätzlich zu den bereits 12.000 genehmigten Satelliten für das Telekommunikationsnetzwerk Starlink. Astronomen zeigten… ... Read More
Stealthy no more? A German radar vendor says it tracked the F-35 jet in 2018 — from a pony farm -- 30 Sep 2019 - COLOGNE, Germany — In the illustrious history of the F-35 fighter jet, add a pony farm outside Berlin as the place where one company claims the plane’s stealth cover was blown. The story that follows is a snapshot in the cat-and-mouse game between combat aircraft — designed to be undetectable… ... Read More
Apple-Update verursacht Datenrekord: 7,1 Terabit pro Sekunde -- 23 Sep 2019 - Die Veröffentlichung des iPhone-Betriebssystems iOS 13 am Donnerstagabend hat beim weltweit größten Internetknoten DE-CIX in Frankfurt am Main offenbar zu einem Datenrekord geführt. Mehr als 7,1 Terabit pro Sekunde liefen zeitweise durch die Leitungen. Das entspricht mehr als 2,1 Millionen Updates pro Stunde. Wie Apple den Daten-Weltrekord pulverisierte Einblick. Seit… ... Read More
US Army Seeks Blockchain Experts Who Can Trace Bitcoin in Real-Time -- 18 Sep 2019 - The United States Army Contracting Command (ACC) of New Jersey has issued a pre-solicitation notice for cryptocurrency investigation service providers.  As a pre-solicitation, posted on July 25, the notice and the ACC’s responses do not bind ACC to solicit or award a contract. For use in criminal investigations According to… ... Read More
ARAMCO: 500 Milliarden Dollar in einer Nacht verloren -- 17 Sep 2019 - Person der Woche: Amin Nasser, Vorstandvorsitzender Aramco Der Raketenangriff auf Ölanlagen trifft Saudi-Arabien nicht nur militärisch. Der wirtschaftliche Schaden ist größer als geahnt, denn der Ölkonzern Aramco steht kurz vor dem Börsengang. Nun ist das teuerste Unternehmen der Welt plötzlich drastisch weniger wert. Amin Nasser ist der Vorstandsvorsitzende von Saudi… ... Read More
1 Billion Mobile Users Vulnerable to Ongoing ‘SimJacker’ Surveillance Attack -- 14 Sep 2019 - More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn. A vulnerability discovered in mobile SIM cards is being actively exploited to track phone owners’ locations, intercept calls and more – all merely by sending an SMS message… ... Read More
China’s APT3 Pilfers Cyberweapons from the NSA -- 08 Sep 2019 - Large portions of APT3’s remote code-execution package were likely reverse-engineered from prior attack artifacts. The advanced persistent threat (APT) group known as APT3, which researchers across the board link to the Chinese government, has built a full in-house battery of exploits and cybertools collectively dubbed “UPSynergy.” An analysis of the… ... Read More
Wie US-Militär und Unternehmen um Hacker buhlen -- 06 Sep 2019 - Patrick Kiley von der IT-Sicherheitsfirma Rapid7 Die US-Luftwaffe karrte einen F35-Simulator zur DEF CON, BMW hielt gemeinsam mit chinesischen Security-Forschern einen Vortrag auf der Black Hat. Andere Organisationen und Unternehmen fremdelten noch. "Hi, ich bin Will. Ich arbeite für die US Air Force“. Der bebrillte Mann im 80er-Jahre-Star-Wars-T-Shirt stand inmitten… ... Read More
Thieves Used Audio Deepfake of a CEO to Steal $243,000 -- 06 Sep 2019 - The heist is just a preview of how unprepared we are for AI-powered cybercrime. In what may be the world’s first AI-powered heist, synthetic audio was used to imitate a chief executive's voice and trick his subordinate into transferring over $240,000 into a secret account, The Wall Street Journal reported… ... Read More
Uno-Bericht: 7 Plattformen beherrschen den Weltmarkt -- 06 Sep 2019 - GAFA, Microsoft, Tencent, Alibaba. Laut dem erstmals erstellten „Digital Economy Report 2019“ der Uno dominieren sieben Plattformen aus den USA und China den weltweiten Markt, darunter Microsoft, Amazon und Alibaba. Die weltweite Digitalwirtschaft wird von sieben Internet- und Tech-Konzernen aus den USA und China sowie deren Plattformen dominiert. Das hat… ... Read More
CCTV: die bestüberwachten Städte Europas -- 05 Sep 2019 - von Mathias Brandt on 05.09.2019 Berlin wird laut einer Erhebung von Comparitech durch fast 40.000 Kameras überwacht - das sind etwa 11,2 Kameras pro 1.000 Einwohner. Damit liegt die Bundeshauptstadt auf Platz 2 im Ranking der bestüberwachten Städte Europas; weltweit liegt Deutschlands größte Stadt auf Platz 19. Im Vergleich mit London… ... Read More
Die 10 innovativsten Volkswirtschaften der Welt -- 05 Sep 2019 - von Frauke Suhr am 05.09.2019 Krebsforschung, Fleischersatzprodukte und Smart-Home-Technologien zählen zu den großen Entwicklungen unserer Zeit. Doch welche Länder sind weltweit führend bei Forschung und Entwicklung? Ein aktuelles Bloomberg-Ranking zeigt die innovativsten Länder nach Indexwert. Darin steht Deutschland auf dem zweiten Platz. In dem Ranking wurden Faktoren wie die Forschungs- und… ... Read More
Youth Myth: Founders of Successful Tech Companies Are Mostly Middle-Aged -- 04 Sep 2019 - Tony Fadell started Nest in 2010, after leading the engineering team that created the iPod and playing a crucial role in the development of the iPhone. Like many entrepreneurs, he was then over 40. Aug. 29, 2019 It took an entrepreneur to reimagine the mundane home thermostat as an object… ... Read More
Google Project Zero: iPhones konnten jahrelang gehackt werden -- 31 Aug 2019 - Um ein iPhone zu infizieren, genügte es, eine manipulierte Webseite zu besuchen. Freitag, 30. August 2019 Unbemerkt beim Surfen Googles Sicherheitsforscher finden heraus, dass iPhones jahrelang über manipulierte Webseiten gehackt und ausspioniert werden konnten. Die Angreifer hatten dabei praktisch volle Kontrolle über die Geräte und konnten nach Belieben Dateien, Fotos,… ... Read More
Do Something About It? Unternehmen leiden massiv unter Hackern -- 21 Aug 2019 - Besonders Großkonzerne sind im Visier von Hackern. Die Angriffsdichte nimmt seit Jahren zu, heißt es in einer Studie. Studie zu Cyber-Attacken Das Internet ist ein zunehmend gefährlicher Raum. Eine Studie kommt zu dem Ergebnis, dass die Gefahren für die deutsche Wirtschaft, Gesellschaft und Politik durch Angriffe aus dem Cyber-Space weiter… ... Read More
2019 – What Happens In One (1) Internet Minute -- 21 Aug 2019 -   found on LinkedIn       ... Read More
140.000 Deutsche direkt vom Brexit betroffen -- 20 Aug 2019 - Nach einem harten Brexit will die britische Regierung die Freizügigkeit für Neuankömmlinge aus der Europäischen Union abschaffen. Wer bereits im Land lebt, darf aber bleiben. Dafür müssen sich im Land lebenden EU-Bürger bei den Behörden registrieren. Das haben indes bislang nur rund eine Million der insgesamt mehr als 3,5 Millionen… ... Read More
US Defense Department to Develop Blockchain Cybersecurity Shield -- 14 Aug 2019 - The U.S. Department of Defense (DoD) is looking to forge a blockchain cybersecurity shield. In a report published on July 12 titled Digital Modernization Strategy, the DoD outlined several ways to advance the nation’s digital defenses. This includes the integration of cloud and quantum computing, artificial intelligence, and improved communications… ... Read More
DEF CON 2019: Researchers Demo Hacking Google Home -- 09 Aug 2019 - Researchers show how they hacked Google Home smart speakers using the Megellan vulnerability. LAS VEGAS – The Tencent Blade Team of researchers demonstrated several ways they have developed to hack and run remote code on Google Home smart speakers. The hacks center around what is known as a Magellan vulnerability,… ... Read More
Black Hat USA 2019: Researchers Bypass Apple FaceID Using Biometrics ‘Achilles Heel’ -- 09 Aug 2019 - “X-Glasses” made by Tencent researchers to bypass FaceID biometrics detection Researchers were able to bypass Apple’s FaceID using a pair of glasses with tape on the lenses. LAS VEGAS – Vulnerabilities have been uncovered in the authentication process of biometrics technology that could allow bad actors to bypass various facial… ... Read More
Global Top 10 best cities to live and work in: 3 of those are in Germany -- 08 Aug 2019 - von Frauke Suhr Gleich drei Städte in Deutschland zählen zu den Top zehn der lebenswertesten Städten der Welt. - In einem aktuellen Ranking hat das Unternehmen Kisi Metropolen weltweit nach der besten Work-Life-Balance bewertet. Zu den Faktoren zählten sowohl harte Daten wie die Arbeitslosenquote, die Anzahl der wöchentlichen Arbeitsstunden, die… ... Read More
BMVg: Ministerium zahlte 155 Millionen Euro für Berater im 1. HJ 2019 -- 08 Aug 2019 - Das Verteidigungsministerium gibt offenkundig von allen Ministerien am meisten Geld für externe Berater aus. Donnerstag, 08. August 2019 Berater für Verteidigungsressort Ministerium zahlte 155 Millionen Euro Seit mehreren Tagen ist bekannt, dass 13 Ministerien im ersten Halbjahr insgesamt 178 Millionen Euro für externe Beratungen ausgegeben haben. Darin ist das Budget… ... Read More
Cyber Warfare: UK Army Deploys New ‘Social Media Warfare’ Division To Fight Russia -- 02 Aug 2019 - by Zak Doffman Forbes Contributor Cybersecurity - I write about security and surveillance (LinkedIn). "We need to develop our asymmetric edge and bring focus to the orchestration of intelligence, information operations, cyber, electronic warfare and unconventional warfare,” Lieutenant General Ivan Jones, the commander of Britain's field army, said as he… ... Read More
The Cyber Kill Chain is dead. Long live the Cognitive Attack Loop. -- 01 Aug 2019 - Cyber Kill Chain Reimagined: Industry Veteran Proposes "Cognitive Attack Loop" The Cyber Kill Chain is dead. Long live the Cognitive Attack Loop. This is the thesis of Tom Kellermann's (Chief Security Officer at Carbon Black and former cyber commissioner for President Obama) new paper, 'Cognitions of a Cybercriminal'. The problem… ... Read More
Former AWS Engineer Arrested as Capital One Admits Massive 100m Data Breach -- 31 Jul 2019 - More than 100 million customers have had their data compromised by a hacker after a cloud misconfiguration at Capital One. A massive breach of Capital One customer data has hit more than 100 million people in the U.S. and 6 million in Canada. Thanks to a cloud misconfiguration, a hacker… ... Read More
Buying a Linux-ready laptop made easy by Tuxedo Germany -- 30 Jul 2019 - Tuxedo makes it easy to buy an out-of-the-box "penguin-ready" laptop. 19 Jul 2019 - by Ricardo Berlass - OpenSource.com Recently, I bought and started using a Tuxedo Book BC1507, a Linux laptop computer. Ten years ago, if someone had told me that, by the end of the decade, I could… ... Read More
Mozilla’s DNS-over-HTTPS makes surfing safer, and improves performance -- 06 Jul 2019 - Internet group brands Mozilla ‘internet villain’ for supporting DNS privacy feature by Zack Whittaker An industry group of internet service providers has branded Firefox browser maker Mozilla an “internet villain” for supporting a DNS security standard. The U.K.’s Internet Services Providers’ Association (ISPA), the trade group for U.K. internet service… ... Read More
Agentur für Cyberwaffen (ADIC): SPD bremst von der Leyens Prestigeprojekt aus -- 06 Jul 2019 - Freitag, 05. Juli 2019 - von Thomas Schmoll Von der Leyens Berateraffäre "Versagen befördert die Karriere" Von der Leyen will nach Brüssel, doch ihre Vergangenheit könnte sie einholen. Viele Mitglieder im Untersuchungsausschuss zur Berateraffäre beharren auf einer Aussage: "Schließlich soll die europäische Öffentlichkeit erleben, wen die Kanzlerin nach Brüssel geschickt… ... Read More
Berlin Ecosystem Launch Report: the most complete and detailed picture of Berlin’s tech ecosystem -- 05 Jul 2019 - Overview: Overview of Berlin’s startup landscape Update on Berlin’s unicorns and future unicorns Update on investment: is Berlin keeping up with Europe? Local PDF copy: https://www.bgp4.com/wp-content/uploads/2019/07/Berlin-Launch-2019-FINAL.pdf Original web PDF copy: https://blog.dealroom.co/wp-content/uploads/2019/07/Berlin-Launch-2019-FINAL.pdf       ... Read More
‘Jetson’ is a Pentagon laser that can identify people by heartbeat -- 01 Jul 2019 - Lookin' for a heartbeat... Forward-looking: Biometrics is advancing and evolving at a rapid rate. It seems like just yesterday we were unlocking our phones with our fingerprint — now it’s our face. What’s it going to be tomorrow — our heartbeat? Well, maybe. MIT Technology Review reports that the Pentagon now… ... Read More
Der chinesisch-amerikanische Anteil am weltweiten Handel beträgt nur 3,1 Prozent -- 28 Jun 2019 - Fünf Gründe sprechen dagegen, dass Trump und sein Handelskrieg die Welt erschüttern werden: ► Erstens: China und Amerika sind zwar die größten Wirtschaftsmächte der Gegenwart. Aber beide produzieren im Wesentlichen für ihre riesigen Binnenmärkte. Hier gibt es keine Zölle und daher auch keinen Zollkrieg. ► Zweitens: Der chinesisch-amerikanische Anteil am… ... Read More
Mobile Apps für Apple sind lukrativer -- 25 Jun 2019 - Android dominiert den Smartphone-Markt und ist auch darüber hinaus das mit Abstand am weitesten verbreitete mobile Betriebssystem. Trotzdem ist Apple für App Publisher immer noch die deutlich lukrativere Adresse, wie ein aktueller Report von Sensor Tower zeigt. Demnach erzielten die 100 größten iOS-App-Publisher im ersten Quartal 2019 durchschnittlich 84 Millionen… ... Read More
Facebook’s Libra: “It would make the early 20th century Morgans or Rockefellers seem downright competitive.” -- 25 Jun 2019 - Standard Oil depicted as an Octopus in a 1904 political cartoon (image via Wikimedia Commons). Facebook’s Libra Cryptocurrency: Bad for Privacy, Bad for Competition Author Scott A. Shay is co-founder and chairman of Signature Bank of New York and also the author of "In Good Faith: Questioning Religion and Atheism"… ... Read More
Der Preis (in $$) der persönlichen Daten in USA -- 20 Jun 2019 - Daten gegen kostenlose Nutzung. Das ist kurz zusammengefasst der Deal auf den sich NutzerInnen sozialer Netzwerke einlassen. Laut einer Umfrage von NBC News/Wall Street Journal aus dem März 2019 finden 74 Prozent der US-Amerikaner, dass das kein fairer Handel ist. Auch in Deutschland dürfte eine entsprechende Umfrage ähnlich ausfallen. Aber… ... Read More
Polizei will bei Alexa mithören -- 05 Jun 2019 - BERLINER KURIER, Mittwoch, 5. Juni 2019     ... Read More
No Patch: Hackers Can Bypass Windows Lockscreen on Remote Desktop Sessions -- 05 Jun 2019 - The Network Level Authentication (NLA) feature of Windows Remote Desktop Services (RDS) can allow a hacker to bypass the lockscreen on remote sessions, and there is no patch from Microsoft, the CERT Coordination Center at Carnegie Mellon University warned on Tuesday. NLA provides better protection for Remote Desktop (RD) sessions… ... Read More
There is no cloud – it’s just someone else’s computer. -- 30 May 2019 - P.S. you can get the sticker here: https://www.redbubble.com/de/people/tamagothings/works/28066602-there-is-no-cloud?p=sticker 2,67 € for small 7,43 € for medium 11,13 € for large size (prices include Euro VAT -- I am not associated with sticker sales, just saving you the search)   People often argue "you get the elasticity" and the "extra bandwidth at spikes", and… ... Read More
ExoWarfare done lousy: Facebook löscht Milliarden Fake Accounts -- 24 May 2019 - (if you can identify them - its done badly)   24 MAY 2019 2,4 Milliarden monatlich aktive Nutzer hat Facebook im Geschäftsbericht für das erste Quartal 2019 gemeldet. Im selben Zeitraum löschte das Unternehmen 2,2 Milliarden Fake-Accounts. Das geht aus dem gestern veröffentlichten Community Standards Enforcement Report hervor. Und dabei… ... Read More
“Bestmixer.io” – EU Authorities Shut Down Bitcoin Transaction Mixer -- 23 May 2019 - 22 MAY 2019 The Dutch Financial Criminal Investigative Service has seized the website of a bitcoin transaction mixer in a crackdown involving Europol and other authorities. Calling it the the “first law enforcement action of its kind against such a cryptocurrency mixer service,” Europol said in a statement Wednesday that… ... Read More
USMC: Marines want their phones and tablets to handle classified data -- 23 May 2019 - The Marine Common Handheld program will provide secure mobile computing at the tactical edge. (Lance Cpl. Harrison C. Rakhshani/Marine Corps)   The Marine Corps has selected several companies to bid on task orders that will allow warfighters to transmit secure on-the-move command-and-control and situational awareness data, including sending classified information… ... Read More
The Gravity of Space-X’s 12,000 Satellites in 3 Layers -- 22 May 2019 - https://www.youtube.com/watch?v=ho36aufooAU   24 MAY 2019 Backgrounder: https://www.youtube.com/watch?v=MTDwXooAvgk   Blast-Off: https://www.youtube.com/watch?v=N-tC7njLArs   Deployed:   https://www.youtube.com/watch?v=KujiMxKomZ0   Spotted: https://www.youtube.com/watch?v=ytUygPqjXEc   Landing of the rocket (3rd use) afterwards: https://www.youtube.com/watch?v=O2wbTRw3zUo       ... Read More
Reality Mining: How Mass Surveillance Works in Xinjiang, China -- 21 May 2019 - (Articles below updated last: 05 JUN 2019) ‘Reverse Engineering’ Police App Reveals Profiling and Monitoring Strategies (Synapsis; full report further below) New York, May 2, 2019 Chinese authorities are using a mobile app to carry out illegal mass surveillance and arbitrary detention of Muslims in China’s western Xinjiang region. The… ... Read More
Dependency on Centralized Services: Massive Outage at SalesForce.com -- 21 May 2019 - Salesforce Woes Linger as Admins Clean Up After Service Outage An accidental permissions snafu caused a massive outage for all Salesforce customers that continues to affect some businesses. After a massive service outage on Friday, software-as-a-service giant Salesforce restored partial access to its affected customers over the weekend, while admins… ... Read More
Power Point presentations should be forbidden at meetings – tell a story instead -- 17 May 2019 - ethos, logos, and pathos the three key elements to persuade Jeff Bezos is prohibited from using Power Point presentations at meetings, as he considers them a waste of time. However, the alternative method by which he has replaced them is most useful and effective. Do you want to know what… ... Read More
Intel MDS Vulnerabilities: ZombieLoad, RIDL (Rogue In-Flight Data Load), Fallout, and Store-to-Leak Forwarding – affect almost every Intel chip since 2011 -- 15 May 2019 - Tech giants have published security advisories and blog posts in response to the Microarchitectural Data Sampling (MDS) vulnerabilities affecting most Intel processors made in the last decade. Remedy? The microcode updates, like previous patches, would have an impact on processor performance. The vulnerabilities are related to speculative execution and they… ... Read More
North Korea: Bitten by Bitcoin Bug – New Dimension Lazarus Hacking -- 09 May 2019 - A report from ProofPoint by Darien Huss   Executive Summary With activity dating at least to 2009, the Lazarus Group has consistently ranked among the most disruptive, successful, and far-reaching state-sponsored actors. Law enforcement agencies suspect that the group has amassed nearly $100 million worth of cryptocurrencies based on their… ... Read More
Large-Scale “BOLD5000” MRI Dataset Bridges Human Vision And Machine Learning -- 09 May 2019 - Improving computer vision was an important part of the BOLD5000 project from its onset. Senior author Elissa Aminoff, then a post-doctoral fellow in CMU’s Psychology Department and now an assistant professor of psychology at Fordham, initiated this research direction with co-author Abhinav Gupta, an associate professor in the Robotics Institute.… ... Read More
Alibaba-backed, Chinese Gov-supporting facial recognition AI startup Megvii raises $750 million -- 09 May 2019 - One of China’s most ambitious artificial intelligence startups, Megvii, more commonly known for its facial recognition brand Face++, announced Wednesday that it has raised $750 million in a Series E funding round. Founded by three graduates from the prestigious Tsinghua University in China, the eight-year-old company specializes in applying its… ... Read More
Russia-linked Threat Group Turla Uses Sophisticated Backdoor ‘LightNeuron’ to Hijack Exchange Mail Servers -- 07 May 2019 - The Russia-linked threat group known as Turla has been using a sophisticated backdoor to hijack Microsoft Exchange mail servers, ESET reported on Tuesday. The malware, dubbed LightNeuron, allows the attackers to read and modify any email passing through the compromised mail server, create and send new emails, and block emails… ... Read More
Chinese Hackers Used NSA Tool a Year Before Shadow Brokers Leak -- 07 May 2019 - A Chinese threat actor was spotted using a tool attributed to the NSA-linked Equation Group more than one year prior to it being leaked by the mysterious Shadow Brokers, Symantec revealed on Monday. The Chinese cyber espionage group is tracked as Buckeye, APT3, UPS Team, Gothic Panda, and TG-0110, and… ... Read More
New report explains how China thinks about information warfare -- 07 May 2019 - The Chinese military has established a Network Systems Department, responsible for information warfare.   The Department of Defense’s annual report on China’s military and security developments provides new details about how China’s military organizes its information warfare enterprise, an area that has been of particular interest to U.S. military leaders.… ... Read More
A World First: Israel Retaliates To A Cyber-Attack With Immediate Physical Action – Wipes Out Hamas Cyber HQ (Incl Personnel) -- 06 May 2019 - GAZA, PALESTINE - 2019/05/05: Smoke rising after an Israeli air raid on homes in Gaza City during the conflict between the Palestinians and the Israeli army that began two days ago.   The Israel Defense Forces (IDF) has launched a physical attack on Hamas in immediate response to an alleged… ... Read More
Summary: US Feds, Europol, and German BKA Bust Up Dark Web “Wall Street Market” -- 06 May 2019 - The now-defunct Wall Street Market (WSM). Image: Dark Web Reviews. Criminal complaint and arrest warrants for: TIBO LOUSEE, 22, from Kleve, also known as (“aka”) “coder420,” aka “codexx420” JONATHAN KALLA, 31, from Bad Vilbel, aka “Kronos” KLAUS-MARTIN FROST, 29, from Stuttgart, aka “TheOne,” aka “The_One,” aka “dudebuy” (collectively known as… ... Read More
[not classified] New documents provide details on NSA relationship with Cyber Command -- 06 May 2019 - Documents obtained via FOIA provide some details regarding how involved NSA was with the build out of Cyber Command's cyber force. (Patrick Semansky/AP) The close-knit relationship between the National Security Agency and U.S. Cyber Command is well known in the defense community, but documents from a series of Freedom of… ... Read More
Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps -- 03 May 2019 - “I can absolutely make a big traffic problem all over the world,” the hacker said. A hacker broke into thousands of accounts belonging to users of two GPS tracker apps, giving him the ability to monitor the locations of tens of thousands of vehicles and even turn off the engines… ... Read More
11.177 DDoS-Attacken im DACH Raum im 1. Quartal 2019 – 3,8 Gbps Durchschnitt -- 02 May 2019 - 11.177 registrierte und abgewehrte DDoS-Attacken auf Webseiten und Server in Deutschland, Österreich und der Schweiz (DACH), die durch Link11 geschützt sind, hat das gleichnamige Unternehmen im ersten Quartal 2019 gezählt. Aber nicht allein die Anzahl der Attacken bereitet den Analysten Sorge, sondern auch die zunehmende Bandbreite und Komplexität der Angriffe.… ... Read More
“Amazing” AI Generates Entire Bodies of People Who Don’t Exist -- 01 May 2019 - (I am amused ... 11 years after the fact it hits the mainstream :yahoo: ) The algorithm whips up photorealistic models and outfits from scratch. Embodied AI A new deep learning algorithm can generate high-resolution, photorealistic images of people — faces, hair, outfits, and all — from scratch. The AI-generated… ... Read More
Malware Infests Popular Pirate Streaming Hardware -- 30 Apr 2019 - Seems hard to feel bad for buyers & users of such devices ... Hardware that supports pirated video streaming content comes packed with malware. You get what you pay for when you pirate content. That’s the takeaway from the latest report by Digital Citizens Alliance. It found that pirating hardware,… ... Read More
Qualcomm Critical Flaw Exposes Private Keys For Android Devices -- 26 Apr 2019 - A side-channel attack in Qualcomm technology, which is used by most modern Android devices, could allow an attacker to snatch private keys. Researchers have uncovered a side-channel attack that enables a bad actor to extract sensitive data from Qualcomm’s secure keystore.  The critical flaw impacts most modern Android devices that… ... Read More
U.S. citizens realize that facial recognition is present in real-life applications without consent -- 24 Apr 2019 - Facial Recognition is Here: But Are We Ready? As U.S. citizens realize that facial recognition is present in real-life applications, more questions are arising about consent, how data is shared – and what regulation exists. When MacKenzie Fegan was boarding her morning flight to Mexico City last Wednesday, she noticed… ... Read More
Tax Burden For Employees Around The World -- 18 Apr 2019 - Steuern und Abgaben in Deutschland besonders hoch Deutsche alleinstehende Arbeitnehmer ohne Kinder tragen im OECD-Vergleich die zweitgrößte Steuer- und Abgabenlast. 39,7 Prozent des Brutto-Einkommens kommen nicht bei den Arbeitnehmern an. Mehr ist es mit 39,8 Prozent nur in Belgien, wie die Grafik von Statista zeigt. Das geht aus einem jährlich… ... Read More
Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst -- 18 Apr 2019 - The financial services industry sees nearly half of all website traffic coming from malicious bots. About a fifth of all web traffic (20.4 percent) comes from bad bots, which continue to attack daily in automated offensives on websites, mobile apps and APIs. That’s worse for some verticals, like the banking… ... Read More
State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally -- 18 Apr 2019 - An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks. A newly-discovered state-sponsored campaign is targeting national security organizations across the Middle East and North Africa (MENA) – and elsewhere – with domain name system (DNS) hijacking attacks, used to scoop up credentials. The campaign,… ... Read More
So viel Speicherplatz verbraucht das Zettabyte-Zeitalter -- 17 Apr 2019 - 33 Zettabytes Daten hat die Menschheit 2018 generiert. Hinter dieser unscheinbaren Zahl verbirgt sich eine kaum vorstellbare Datenmenge. Ein Zettabyte sind 1.000.000.000.000.000 Megabyte. Damit ließen sich Beispielsweise 660 Milliarden Standard-Blu-rays füllen oder 33 Millionen menschliche Gehirne. Und damit steht die Menschheit datenvolumentechnisch noch ziemlich am Anfang, wie ein Blick in… ... Read More
Could artificial intelligence save the Pentagon $15 billion a year? -- 17 Apr 2019 - U.S. Air Force aircraft maintainers perform post-flight maintenance on an E-3 Sentry AWACS. (Senior Master Sgt. Roger Parsons/U.S. Air National Guard) "The average aircraft in the US Air Force is about 28 years old and on any given day about 30 percent of the aircraft cannot deploy. The service wants… ... Read More
Where Hackers Attack – Q4 2018 -- 17 Apr 2019 - 2016 zielten laut Kaspersky nur 16 Prozent aller Cyberattacken auf Microsoft Office. Zwei Jahre später hat sich der Anteil der Angriffe auf 70 Prozent vervielfacht. Verantwortlich für den Anstieg sollen eine Vielzahl sogenannter Zero Day Exploits sein. Das sind Sicherheitslücken, die am selben Tag erfolgen, an dem die hierbei ausgenutzte… ... Read More
GAFA: Tech-Riesen erhöhen das Lobby-Budget (in USA) -- 15 Apr 2019 - 54,7 Millionen US-Dollar haben Google, Amazon, Facebook und Apple (GAFA) zusammengenommen 2018 für Lobbyarbeit in den USA ausgegeben - das entspricht einer Steigerung von rund elf Prozent gegenüber dem Vorjahr. Über den mit Abstand größten Lobbyetat verfügt mit 21,2 Millionen US-Dollar Google. Dagegen hat Apple nur 6,6 Millionen US-Dollar in… ... Read More
Small stickers on the ground trick Tesla autopilot into steering into opposing traffic lane -- 04 Apr 2019 - Researchers from Tencent Keen Security Lab have published a report detailing their successful attacks on Tesla firmware, including remote control over the steering, and an adversarial example attack on the autopilot that confuses the car into driving into the oncoming traffic lane. The researchers used an attack chain that they… ... Read More
Research: Deanonymization of apps on an android mobile device running Tor -- 04 Apr 2019 - Tor is by far the most popular anonymity communication network, boasting over two million daily users from all parts of the globe. In a desktop setting, Tor is namely used to preserve anonymity while browsing the internet. Moreover, Tor may be used to protect any form of TCP based network… ... Read More
New Malware Is Scanning The Internet For Systems Info On Valuable Targets -- 03 Apr 2019 - Newly identified Xwo malware could be laying the groundwork for far more damaging cyberattacks around the globe, warn researchers.  By Danny Palmer | April 3, 2019 A new form of malware is scanning the internet for exposed web services and default passwords in what's thought to be a reconnaissance operation… ... Read More
FTC hands multimillion-dollar fines to four robocalling companies -- 28 Mar 2019 - By Adi Robertson - @thedextriarchy - Mar 27, 2019 Four “robocalling” companies, including an operation that allegedly scammed businesses by pretending to be Google, have shut down and settled lawsuits with the Federal Trade Commission. The FTC announced the news yesterday, claiming that the groups made “billions” of illegal prerecorded… ... Read More
A US DoD AI expert is coming — and that could mean big things for directed energy -- 23 Mar 2019 - Department of Defense undersecretary of research and engineering Michael Griffin has carved out nine assistant director spots to focus on key technology areas, such as directed energy, hypersonics and AI. (David Vergun/Defense Media Activity)   WASHINGTON — A vacant Pentagon position on artificial intelligence will be filled “quite soon,” with… ... Read More
BGP4 for SAT COMs: What if satellite communication was as simple as roaming cell service? -- 23 Mar 2019 - Cpl. Nicholas L. Dye (left), satellite transportable terminal operator, Headquarters and Headquarters Company, 1st Battalion, 66th Armor Regiment, 3rd Armored Brigade Combat Team, 4th Infantry Division, and Spc. Emmanuel L. Tate, signal systems support specialist, HHC, 1st Bn., 66th Armor Regiment, 3rd ABCT, 4th Inf. Div., work together to position… ... Read More
Incredible Experiment Gives Infrared Vision to Mice — and Humans Could Be Next -- 20 Mar 2019 - Special nanoparticles (shown in white) clinging to rods (left) and cones (right) in the photoreceptors of mice By injecting nanoparticles into the eyes of mice, scientists gave them the ability to see near-infrared light—a wavelength not normally visible to rodents (or people). It’s an extraordinary achievement, one made even more… ... Read More
NVIDIA’s Jetson Nano Brings AI Computing to Everyone -- 20 Mar 2019 - Jetson Nano Developer Kit (80x100mm), available now for $99 By Dustin Franklin | March 18, 2019 NVIDIA announced the Jetson Nano Developer Kit at the 2019 NVIDIA GPU Technology Conference (GTC), a $99 computer available now for embedded designers, researchers, and DIY makers, delivering the power of modern AI in a compact, easy-to-use… ... Read More
TensorFlow Privacy, an AI machine learning library with ‘strong privacy guarantees’ -- 20 Mar 2019 - 06 MAR 2019 Google announced TensorFlow Privacy, a library for its TensorFlow machine learning framework intended to make it easier for developers to train AI models with strong privacy guarantees. It’s available in open source, and requires “no expertise in privacy” or underlying mathematics, Google says. Moreover, developers using standard… ... Read More
Say “Hello” to Google Coral: Edge TPU, Google’s custom ASIC for machine learning has arrived -- 19 Mar 2019 - During Injong Rhee’s keynote at last year’s Google Next conference in San Francisco, Google announced two new upcoming hardware products: a development board and a USB accelerator stick. Both products were built around Google’s Edge TPU, their purpose-built ASIC designed to run machine learning inference at the edge. Almost a… ... Read More
AWS adopts Nvidia’s Tesla T4 chip for AI inference -- 19 Mar 2019 - Amazon’s AWS today announced new EC2 instances with Tesla T4 GPUs, which it says will be available via G4 instances to customers in the coming weeks. T4 will also be available through the Amazon Elastic Container service for Kubernetes. “It will be featuring Nvidia T4 processors and really designed for machine… ... Read More
OpenAI let us try its state-of-the-art NLP text generator -- 19 Mar 2019 - Natural Language Processing (NLP)   Language is power, and engineering a system that can comprehend it as well as any human is a grand challenge in AI research. Recent contributions like Google’s BERT, a framework that can train state-of-the-art natural language processing (NLP) models in a few hours on a… ... Read More
OneWeb raises $1.25 billion to mass-produce high-speed internet satellites -- 19 Mar 2019 - OneWeb, a space startup that recently launched its first “constellation” of micro-satellites to deliver broadband access across the globe, has raised $1.25 billion to begin mass-producing its satellites and capitalize on what it calls “first mover advantage.” The gargantuan cash injection was led by SoftBank, Qualcomm, Grupo Salinas, and the… ... Read More
Increasing Crypto Mining Attacks in Cloud Infrastructures -- 18 Mar 2019 - Cryptocurrency mining is reportedly one of the most observed objectives of hackers attacking businesses’ cloud infrastructures, according to a report by AT&T Cybersecurity on March 14. The cybersecurity wing of United States telecoms firm AT&T stated that organizations of all sizes continue to face major crypto mining attacks despite the… ... Read More
The Dawn of the Deep Tech Ecosystem – Mehr Licht auf die Startups im Maschinenraum -- 18 Mar 2019 - March 14, 201914 MAR 2019 -- by Massimo Portincaso, Arnaud de la Tour, and Philippe Soussan Deep technologies — novel technologies that offer significant advances over those currently in use — are attracting an unprecedented amount of interest and activity. The aggregate global private investment in seven deep tech categories… ... Read More
Vierbeinige Mikroroboter krabbeln durch den Körper -- 15 Mar 2019 - 70 Mikrometer kleine Roboter könnten im menschlichen Blutkreis zu geschädigten Zellen wandern und "Reparaturen" ausführen. Laufen können sie bereits. Von Hans-Arthur Marsiske Winzige Roboter, die im menschlichen Körper gezielt einzelne Zellen behandeln, sind eine faszinierende Vision, die viele Forscher beflügelt. Ein großes Problem ist dabei jedoch die Fortbewegung: Wie gelangen… ... Read More
Smartwatch-Absatz: Apple Watch ist mit Abstand Nr. 1 -- 04 Mar 2019 - von Mathias Brandt, 04.03.2019 Die Apple Watch dominiert den Markt für smarte Uhren. Das zeigen aktuelle Zahlen von Strategy Analytics. Demnach hat Apple im vergangenen Jahr 22,5 Millionen Apple Watches verkauft und kommt damit auf einen Marktanteil von 50 Prozent. Dagegen sehen die Absatzzahlen der Konkurrenten eher mickrig aus, wie… ... Read More
Mobilität: die größten Carsharing-Anbieter in Deutschland -- 04 Mar 2019 - von Matthias Janson, 04.03.2019 Die Fahrzeugzahl der Carsharingflotte in Deutschland liegt im fünfstelligen Bereich, die Kundenzahlen gehen in die Millionen. Die Statista-Grafik auf Basis von Carsharing-News-Daten zeigt, wie sich der Markt aufteilt: Nach der Fusion von Car2Go und DriveNow ist ein derzeit übermächtiges Joint-Venture entstanden, dass mit über 1,7 Millionen Kunden… ... Read More
U.S. Cyber Command operation disrupted Internet access of Russian troll factory on day of 2018 midterms -- 02 Mar 2019 - The building that housed the Internet Research Agency in St. Petersburg, shown in 2018. (Dmitri Lovetsky/AP)   By Ellen Nakashima February 27 The U.S. military blocked Internet access to an infamous Russian entity seeking to sow discord among Americans during the 2018 midterms, several U.S. officials said, a warning that… ... Read More
Wo die Einhörner herkommen -- 27 Feb 2019 - von Mathias Brandt, 26.02.2019 326 nicht börsennotierte Unternehmen werden laut CB Insights aktuell mit einer Milliarde US-Dollar oder mehr bewertet. 156 dieser sogenannten Einhörner (engl. Unicorns) kommen aus den USA. Weitere 92 sind in China beheimatet. Auch hierzulande gibt es mittlerweile neun Unternehmen mit Einhorn-Status. Neu in die Liste aufgenommen… ... Read More
Gefälschte Dokumente: Forscher tricksen fast alle PDF-Reader aus (außer Linux) -- 26 Feb 2019 - Behördenschreiben, Amazon-Rechnungen, Gesetzestexte: Forschern ist es gelungen, populären PDF-Readern manipulierte Dokumente unterzujubeln - mit simplen Mitteln. Warnungen gab es fast nie. Montag, 25.02.2019 - Spiegel Online Ihr Erfolg überraschte die Forscher selbst. Kaum ein gängiges Programm merkte es, wenn elektronisch signierte PDF-Dateien in ihren Tests auf simple Weise manipuliert wurden.… ... Read More
5G Security: „TRacking via Paging mEssage DistributiOn“ – Torpedo -- 26 Feb 2019 - Noch vor dem Start – eine neuentdeckte Sicherheitslücke betrifft auch 5G-Netze 26.02.2019, 08:38 Uhr Forscher haben neue Sicherheitslücken in den 4G- und 5G-Mobilfunkstandards entdeckt. Die Lücken könnten dazu genutzt werden, Telefonate abzufangen und die Position eines Handy-Nutzers zu bestimmen. Eigentlich sollte das Mobilfunknetz der fünften Generation (5G) neben höheren Geschwindigkeiten… ... Read More
4 Promising Use Cases Of Blockchain In Cybersecurity -- 21 Feb 2019 - 2018 was a rocky year security-wise. Governments, universities, power companies and ‘big name’ entreprises became victims of elaborate hacks. This year, 75% of CEOs and board members name cybersecurity and technology acquisitions among their top priorities. Blockchain-based solutions are among the commonly considered options. And not just among business leaders.… ... Read More
Are you immediately disqualified from applying to NSA if you charge your phone there? -- 21 Feb 2019 - more: https://twitter.com/RGB_Lights/status/1086328344327507968       ... Read More
A Sharp Rise In Attacks Targeting Known Vulnerabilities In Hadoop Distributed Frameworks -- 21 Feb 2019 - Hadoop databases haven't been getting much interest from hackers so far, compared to other data silos, but that's changing, according to a new study. Security shop Securonix, reports that its research team has seen a sharp rise in attacks targeting known vulnerabilities in Hadoop components such as Hadoop YARN, Redis,… ... Read More
WIFI In Your Malicious USB Cables: O.MG Cable -- 21 Feb 2019 - Just watch this - it is self-explanatory:   From the author / maker: Firstly, the frontend needs some help! If you are good with JavaScript and would like to contribute, please reach out to me on twitter. cnlohr did the heavy lifting on the backend, so there is mostly just… ... Read More
ATM Hacking Has Gotten So Easy, the Malware’s a Game -- 21 Feb 2019 - As long as there are ATMs, hackers will be there to drain them of money. Although ATM-targeted “jackpotting” malware—which forces machines to spit out cash—has been on the rise for several years, a recent variation of the scheme takes that concept literally, turning the machine’s interface into something like a… ... Read More
Cold War Fact 1967: KGB Shipped Stolen Sidewinder Missile Via Mail From Germany To Moscow – To Copy It -- 21 Feb 2019 - That the Soviet-made R-3S air-to-air missile — better known in the West by its NATO-designation AA-2 Atoll — is a copy of the AIM-9B Sidewinder, originally developed and manufactured in the USA, is relatively well-known. How it came to be … isn’t so well-known. It involved the mail. The story… ... Read More
Troubled Rolls-Royce Trent 1000 Engines: Boeing 787 Suffers Rare Dual Engine Failure Due To Software Problem -- 21 Feb 2019 - A simultaneous dual engine failure on modern twin engine commercial airliners is one of the rarest events in aviation. Rare or not, that’s exactly what happened to ANA flight NH985 when it touched down at Osaka Itami (ITM) on Jan. 17. The pilots completed the touchdown and were rolling down… ... Read More
Grenade Drones Progress From Improvised To Industry -- 21 Feb 2019 - The Rippel Effect Systems grenade launcher for drones was on display at the 2019 IDEX show. (Navy photo)   The first grenades dropped from drones were an improvised experiment. Like the haphazard scouts of the 1910s who first chucked bombs out of cockpits onto foes below, the quadcopter grenade bombers… ... Read More
Investigating JEDI Conflicts of Interest -- 21 Feb 2019 - The Department of Defense will now have the time to investigate information concerning a conflict of interest between two former employees and the $10 billion cloud contract. (BrianAJackson) Judge grants stay of lawsuit to investigate JEDI conflicts of interest An Oracle lawsuit challenging the Department of Defense’s $10 billion Joint… ... Read More
Solar Power Stations In Space – Sending Energy To Earth -- 21 Feb 2019 - Plans for first Chinese solar power station in space revealed By Kirsty Needham - February 15, 2019 - The Sydney Morning Herald Beijing: China is taking its renewable energy push to new heights, with scientists revealing plans to build the first solar power station in space. A solar power station… ... Read More
Umsatzerlöse der fünf größten US-Waffenschmieden -- 21 Feb 2019 - by Steingarts Morning Briefing - 21 FEB 2019 Die Friedensdividende, die Ost und West nach dem Zerfall der Sowjetunion genossen hatten, ist damit aufgezehrt. Wir erleben die Rückkehr archaischer Machtpolitik, die davon ausgeht, dass nicht der Klügere, sondern der technologisch Schwächere nachgibt. Trumps Amerika, sagt Prof. Peter R. Neumann, Sicherheitsexperte… ... Read More
Die Trend-Themen der Berater 2016-2018 -- 21 Feb 2019 - von Mathias Brandt am 20.02.2019 Womit beschäftigen sich eigentlich Unternehmensberatungen? Um diese Frage zu beantworten, haben Statista-Analysten 162 Whitepaper und Artikel führender Beratungsunternehmen - unter anderem Accenture, Boston Consulting, McKinsey - aus den letzten Jahren ausgewertet. Davon drehten sich 36 Publikationen (22,2 Prozent) um das Thema Digitale Transformation. Auf Platz zwei… ... Read More
Anger Sparked: Google says Nest’s secret microphone was ‘never intended to be a secret’ -- 20 Feb 2019 - [Privacy Ignorance: how can you "forget" you put a microphone in it?] Google said there’s absolutely, positively nothing to worry about the secret microphone in your Nest Secure smart home hub that it didn’t tell you about. Nope, not at all. Just an oversight, said Google. No need to be… ... Read More
Supply Chain Attacks Nearly Doubled in 2018 -- 20 Feb 2019 - By Ionut Arghire on February 20, 2019 The number of supply chain attacks observed last year was 78% higher compared to the previous year, a new Symantec report reveals.  Aiming to compromise a target by exploiting third-party services and software, supply chain attacks take many forms, including the hijacking of… ... Read More
Stellenmarkt Deutschland 2019 -- 20 Feb 2019 - Zahl der offenen Stellen steigt sprunghaft an von Frauke Suhr, 20.02.2019 Die Zahl der offenen Stellen in Deutschland hat ein Rekordhoch erreicht. Wie das IAB-Forschungsinstitut der Bundesagentur für Arbeit heute meldete, gab es trotz Konjunkturschwäche im vierten Quartal 2018 einen neuen Höchstwert von 1,46 Millionen offenen Stellenangeboten. Im Westen waren 1,13… ... Read More
Leistungsbilanz 2018: Deutschland Top, USA Flop -- 20 Feb 2019 - Die deutsche Volkswirtschaft in Gänze braucht sich davon nicht angesprochen zu fühlen. 2018 wurde mit 294 Milliarden US-Dollar und damit 7,4 Prozent des BIP wieder der weltgrößte Exportüberschuss erzielt. Die USA sind erneut das Land mit dem größten Leistungsbilanzdefizit von rund 455 Milliarden US-Dollar. Damit vergrößerte sich das amerikanische Minus… ... Read More
Protecting the Logical Security of a Network Environment -- 19 Feb 2019 - By Edward J. Hawkins, II Contributor, InCyberDefense Once you’ve successfully completed the physical security of your environment, it is time to examine its logical security. Logical security should reflect the administrative security of the environment. It is the mapping of the administrative security to its logical counterparts. For example, if… ... Read More
US Navy Renames ‘System Centers’ to ‘Information Warfare Centers’ -- 19 Feb 2019 - Rear Adm. Christian Becker, head of Space and Naval Warfare Systems Command, speaks at West 2018. (U.S. Naval Institute)   The Navy’s primary IT organization is renaming its subordinate centers to better reflect the reality of information warfare. Space and Naval Warfare Systems Command Commander Rear Adm. Christian Becker told… ... Read More
Germany to Let NATO Use its Cyber Skills -- 19 Feb 2019 - [This is just a log of the news by AFP] By AFP on February 14, 2019 Germany is to join the ranks of NATO countries making its cyber warfare skills available to the alliance to help fight hacking and electronic warfare, officials said on Thursday. NATO has designated cyberspace as… ... Read More
Japan’s Cloud Storage Security Regulation (similar to United States, Britain, and Australia) -- 19 Feb 2019 - The Japanese government plans on strengthening its defenses against cyber attacks from China, among other nations. It aims to do so through regulating and securing the use of cloud services. The government plans to draw up security standards and start trial runs this year, with the aim of introducing the… ... Read More
Anti-Jamming Market Trends and Forecast: $3.5 bln in 2018, $5.6 bln by 2025 -- 19 Feb 2019 - GPS technology has revolutionized modern warfare. Military organizations regularly depend on satellite technology for accurate positioning, timing and communications. But GPS signals received on Earth are weak and susceptible to interference and intentional jamming. GPS Anti-Jamming uses power minimization to reduce the effect of interference and jamming so that the… ... Read More
Improved Defense for Indian VIP Aircraft -- 19 Feb 2019 - The U.S. will sell India equipment similar to the one used on the two ‘Air Force One’ Boeing 747 aircraft that carry the US president. The deal includes two Large Aircraft Infrared Countermeasures Self-Protection Suites (SPS) for VIP jets. The systems consist of AN/AAQ 24(V)N Large Aircraft Infrared Countermeasures (LAIRCM)… ... Read More
Fully-Automated Drone With No Pilot: Autonomous Drone Gets Unprecedented Approval in France -- 19 Feb 2019 - Large drone markets are currently restrained by the complexity of common drone solutions implementation, due to various considerations regarding risk to the public. For the first time in Europe, the Directorate-General for Civil Aviation (DGAC) which regulates drones uses in France, has approved a fully-automated drone with no pilot, an… ... Read More
Revitalisiert 5G den Smartphone-Markt? -- 15 Feb 2019 - von  Mathias Brandt  15.02.2019 1,4 Milliarden Smartphones wurden laut IDC 2018 weltweit abgesetzt - das entspricht einem Rückgang von 4,1 Prozent gegenüber dem Vorjahr. Schuld sind unter anderem die hohe Verbreitung und der Mangel an echten Innovationen. "Der Smartphone-Markt ist derzeit weltweit ein Durcheinander", so Ryan Reith, Vice President von… ... Read More
SIM Swappers Swindle Millions — Biggest Criminal Threat in Crypto in 2019? -- 13 Feb 2019 - Cryptocurrency crime trends have been in the spotlight in recent weeks, but SIM swapping has been strangely absent in a number of reports on 2018. Cryptocurrency analytics companies CipherTrace and Chainalysis released two different reports focusing on the major crime trends in the space in 2018. While their data and… ... Read More
Digitale Trends bis 2030 -- 13 Feb 2019 - Deutschland steht vor einer historisch bedeutsamen Transformation. Digitalisierung und Elektrifizierung werden jeden zweiten Arbeitsplatz nicht vernichten, aber doch so grundlegend verändern, dass es viele als Vernichtung ihres bisherigen Status und Veränderung ihrer Routinen empfinden werden.     Vor allem die deutsche Autoindustrie, wo sich die Geister der Veränderung auf dem… ... Read More
Software-Defined Networking (SDN): Intent-Based Network Segmentation -- 11 Feb 2019 - [Source: Vendor (!)] By John Maddison (Sr. Vice President, Products and Solutions at Fortinet) on February 07, 2019 Network Segmentation Needs to be Able to Consistently Secure and Isolate Data Regardless of Where it Needs to Go While networks continue to expand and evolve, the primary goals of the security… ... Read More
Russia to Implement Blockchain Tech in University Exam for Education Quality Control -- 11 Feb 2019 - The Russian Federal Service for Supervision in the Sphere of Education and Science, (Rosobrnadzor) will implement blockchain technology in the country’s main graduation examination, major Russian news agency TASS reports Feb. 5. Starting this year, Rosobrnadzor intends to implement blockchain technology in the Unified State Exam (USE), which is the… ... Read More
“Predictive Policing” in Berlin -- 11 Feb 2019 - Vorhersage-Software: So genau ist das Programm der Polizei Seit mehr als zwei Jahren testet die Berliner Polizei nun schon diese Software, die Wahrscheinlichkeiten für Einbrüche vorhersagt. Berlin. Das Vorhersage-Programm „KrimPro“ der Berliner Polizei wird immer genauer. Knapp 60 Prozent der vorausgesagten Wohnraumeinbrüche im Jahr 2018 traten tatsächlich auch ein. Das teilte… ... Read More
Das sind die häufigsten Deal Breaker mit VCs -- 11 Feb 2019 - by Jan Schnedler - 08 FEB 2019 Im schlimmsten Fall kann einer dieser Punkte ausreichen, damit ein Investor sich gegen die Finanzierung eines Startups entscheidet. Werden mehrere dieser Punkte erfüllt, wird es für Startups bei professionellen Investoren sehr schwer, eine Finanzierung zu erhalten. In meiner langjährigen Startup-Beratung haben sich einige… ... Read More
Russia to disconnect from the internet as part of a planned test -- 11 Feb 2019 - Russia's internet contingency plan gets closer to reality. By Catalin Cimpanu for Zero Day | February 11, 2019 Russian authorities and major internet providers are planning to disconnect the country from the internet as part of a planned experiment, Russian news agency RosBiznesKonsalting (RBK) reported last week. The reason for… ... Read More
Die Smartphones mit der geringsten / höchsten Strahlung -- 09 Feb 2019 - Das Smartphone ist für viele Menschen ein ständiger Begleiter. Bei manchen melden sich da Zweifel: Kann die Strahlung der Geräte ihre Gesundheit gefährden? Eindeutige wissenschaftliche Antworten gibt es nicht. Wer auf Nummer sicher gehen will, kann sich beim Bundesamt für Strahlenschutz über die Strahlungsintensität der einzelnen Smartphone-Modelle informieren. Demnach ist… ... Read More
US Senators want DHS to look into government use of foreign VPNs -- 09 Feb 2019 - By Derek B. Johnson - FCW / The Business of Federal Technology Two senators have asked the Department of Homeland Security to look into the possibility of banning federal employees from using browsers and virtual private networks created by foreign companies on government devices, arguing that they could contain malware… ... Read More
Spotify will now suspend or terminate accounts it finds are using ad blockers -- 09 Feb 2019 - [ad-based business models coming to an end, finally?] Spotify will take a harder stance on ad blockers in its updated terms of service. In an email to users today, the streaming music and podcast platform said its new user guidelines “mak[e] it clear that all types of ad blockers, bots… ... Read More
“Glassbox”: Populäre iPhone-Apps machen heimlich Screenshots -- 08 Feb 2019 - Donnerstag, 07. Februar 2019 Analyse ohne Einverständnis Einige weltweit oft genutzte iPhone-Apps zeichnen alle Eingaben des Nutzers auf. Dies geschieht zwar mit einem bisher legalen Analyse-Tool, aber oft heimlich und ohne ausreichende Absicherung. Auch Kreditkartendaten sind in Gefahr. Es ist verständlich, dass App-Entwickler gerne das Nutzerverhalten analysieren, um ihre Anwendungen… ... Read More
“Diminished Reality”: Informatiker lassen aus Livestream Objekte und Personen verschwinden -- 08 Feb 2019 - Forscher der Universität Wien haben eine App entwickelt, die Objekte in Echtzeit aus Videos verschwinden lässt. Informatiker der Uni Wien können aus Livestreams Objekte oder Personen selbst vor stark strukturierten Hintergründen verschwinden lassen. Ein zuvor erzeugtes 3D-Modell der Umgebung ersetzt in Echtzeit das entfernte Objekt bzw. die Person durch den… ... Read More
Das lineare Fernsehen ist in zehn Jahren tot – glauben viele junge Erwachsene -- 08 Feb 2019 - [Ich nutze schon seit 2006 kaum noch lineares Fernsehen ... allerdings auch nicht Netflix & Co] Es ist eine der ganz großen Zukunftsfragen in der Medienbranche: Wie werden sich Relevanz und Reichweite des linearen Fernsehens entwickeln, wenn Streamingdienste und Videoplattformen wie Netflix, Amazon Prime Video und Youtube weiter wachsen? Einer… ... Read More
Whatsapp-Alternative: Frankreich wandert in die Matrix -- 06 Feb 2019 - 05.02.2019, 18:48 Uhr Die französische Regierung beginnt damit, ihre eigene Whatsapp-Alternative auf Basis der freien Chat-Software Matrix auszurollen. Die Entwickler aus Community und Verwaltung mussten dafür viel Arbeit leisten, wie ein Vortrag auf der Fosdem darstellt. Seit vergangenem Frühjahr entsteht im Auftrag der französischen Regierung ein Messengerdienst für die Behörden… ... Read More
“C0rpz”: Researchers Identify Hacker Behind Massive Data Breach Collection -- 05 Feb 2019 - By Ionut Arghire on February 04, 2019 Recorded Future says that its security researchers were able to identify the hacker who first distributed the recently surfaced database of 773 million email addresses.  Named “Collection #1” and made up of individual data breaches from thousands of different sources, the database was… ... Read More
Device-Level Multi-Function Printer Security Information Event Management (SIEM) Integration -- 05 Feb 2019 - By Eduard Kovacs on February 04, 2019 Imaging giant Canon on Monday unveiled the third generation of its imageRUNNER ADVANCE multifunction printers (MFP). The company says the latest edition introduces significant cybersecurity features designed to help organizations protect their assets. According to Canon, third generation imageRUNNER ADVANCE devices introduce security… ... Read More
Amp Factor 34: Attackers Use CoAP for 90-Second dDoS Amplification -- 05 Feb 2019 - By Ionut Arghire on February 04, 2019 Attackers recently started abusing the Constrained Application Protocol (CoAP) for the reflection/amplification of distributed denial of service (dDoS) attacks, NETSCOUT warns. CoAP is a simple UDP protocol designed for low-power computers on unreliable networks that appears similar to HTTP, but which operates over… ... Read More
US DHS to create permanent incident response and so-called “Cyber Hunt” Teams – following “Hack DHS Act” -- 05 Feb 2019 - Senators Reintroduce DHS Cyber Hunt and Incident Response Teams Act By Eduard Kovacs on February 04, 2019 United States Senators Maggie Hassan (D-NH) and Rob Portman (R-OH) on Friday announced the reintroduction of the bipartisan Department of Homeland Security (DHS) Cyber Hunt and Incident Response Teams Act. The bill requires… ... Read More
Medical Device Security Firm Medigate Raises $15 Million -- 31 Jan 2019 - By Eduard Kovacs on January 29, 2019 Medigate, a company that provides medical device security and asset management solutions, on Tuesday announced that it raised $15 million in a Series A funding round, which brings the total raised to date to over $20 million. The funding round was led by… ... Read More
Israel Blocks Iran Cyber-attacks ‘Daily’ -- 31 Jan 2019 - By AFP on January 29, 2019 Prime Minister Benjamin Netanyahu on Tuesday accused arch-foe Iran of regularly launching cyber-attacks on Israel that the Jewish state blocks each day. "Iran attacks Israel on a daily basis," he told a cyber conference in Tel Aviv. "We monitor these attacks, we see these… ... Read More
U.S. Intel Community: Russia, China Can Disrupt Critical Infrastructure -- 31 Jan 2019 - By Eduard Kovacs on January 30, 2019   Russia and China are capable of disrupting critical infrastructure in the United States, and Iran is not far behind, according to the Worldwide Threat Assessment made public by the U.S. intelligence community on Tuesday.   The assessment covers a wide range of… ... Read More
Cyberattacken: Die Kosten der Unsicherheit – 5,2 Billionen für 2019-2023 -- 29 Jan 2019 - von Mathias Brandt 29.01.2019 5,2 Billionen US-Dollar Umsatz könnten Unternehmen weltweit durch Cyberattacken in den nächsten fünf Jahren entgehen. Das jedenfalls schätzen die Analysten von Accenture in der aktuellen Studie "Securing the Digital Economy: Reinventing the Internet for Trust". Am stärksten betroffen ist die Hightech-Industrie mit mehr 753 Milliarden US-Dollar. Es… ... Read More
Global Gap Of Nearly 3 Million CyberSecurity Positions -- 29 Jan 2019 - Too few cybersecurity professionals is a gigantic problem for 2019 Robert Ackerman@BobAckerman As the new year begins gaining steam, there is ostensibly a piece of good news on the cyber front. Major cyberattacks have been in a lull in recent months, and still are. The good tidings are fleeting, however.… ... Read More
„Orbital Display“: Russian startup wants to launch glowing space billboards in 2020 -- 28 Jan 2019 - So stellt sich Startrocket Werbung am Nachthimmel vor. (Screenshot: Vimeo/Sitnikov, t3n) by Brittany A. Roston - Jan 16, 2019 A Russian startup called StartRocket is working on a terrible idea: space billboards that glow from low Earth orbit. The company hopes to one day offer these space billboards to corporate… ... Read More
APT Attribution: Link Found Between GreyEnergy and Zebrocy Attacks -- 25 Jan 2019 - By Eduard Kovacs Researchers from Kaspersky Lab’s Industrial Control Systems Cyber Emergency Response Team (ICS CERT) have found significant overlaps in GreyEnergy and Zebrocy activity, both of which were previously linked to Russia. GreyEnergy is a threat actor that is believed to be a successor of the notorious BlackEnergy group… ... Read More
Amazon WorkLink: AWS Provides Secure Access to Internal Corporate Assets -- 25 Jan 2019 - Amazon Web Services (AWS) on Wednesday announced the launch of Amazon WorkLink, a service that enables organizations to provide employees easy and secure access to internal websites and applications from their mobile devices without the need for a VPN or custom browser. When employees install Amazon WorkLink on their mobile… ... Read More
Russia tests ‘underwater quadcopter’ for cold water exploration -- 25 Jan 2019 - In a swimming pool in Krasnoyarsk, Russia a robot prototype prepares for an arctic journey. The robot is small enough, the preparations modest enough, that people swim laps as normal in the other half of the pool. This new tethered machine, with a quadcopter-inspired body, is built to scout the… ... Read More
3D-Printed Heads Let Hackers – And Cops – Unlock Your Phone -- 25 Jan 2019 - There’s a lot you can make with a 3D printer: prosthetics, corneas, firearms — even an Olympic-standard luge. You can even 3D-print a life-size replica of a human head — and not just for Hollywood. Forbes reporter Thomas Brewster commissioned a 3D-printed model of his own head to test the face unlocking… ... Read More
“Poseidon”: Russia Begins Testing “Unstoppable” Nuclear Weapon That Can Travel Underwater -- 25 Jan 2019 - Russia’s nuclear-capable “doomsday” drone, named Poseidon by Russia and Kanyon by the U.S., is seen in this simulation played by Russian President Vladimir Putin during his state of the nation address, on March 1. RUSSIAN MINISTRY OF DEFENSE   Moscow has reportedly begun testing an underwater nuclear weapon that has… ... Read More
Intel’s ‘Neural Network on a Stick v2’ Brings AI Training to You -- 25 Jan 2019 - The Neural Compute Stick will retail for $100   by Andrew Tarantola Ahead of its first AI developers conference in Beijing, Intel has announced it's making the process of imparting intelligence into smart home gadgets and other network edge devices faster and easier thanks to the company's latest invention: the… ... Read More
New USB Attack Vector by Charger Cable -- 25 Jan 2019 - Watch as Kevin Mitnick shows how a malicious USB charging cable can be used by hackers: https://www.youtube.com/watch?v=YjQhS_95t7s     ... Read More
Top High-Performance Computers by TeraFLOPS -- 24 Jan 2019 - Die weltweit leistungsfähigsten Rechnersysteme werden als Supercomputer bezeichnet. Die meisten dieser digitalen Giganten finden ihren Einsatz in der Industrie. Hier berechnen sie u.a. komplexe Simulationen. Die Infografik von Statista zeigt die Rechenleistung der leistungsstärksten Supercomputer weltweit im November 2018. Der Rechner "Summit" vom Hersteller IBM erzielt eine Leistung von rund… ... Read More
Internet of Things — Trends and Statistics -- 24 Jan 2019 - (Infographic) ... Read More
Attackers Use Steganography to Obfuscate PDF Exploits -- 24 Jan 2019 - By Ionut Arghire on January 24, 2019 A recently discovered PDF exploit used steganography to hide malicious JavaScript code in images embedded in PDF files, according to exploit analysis firm EdgeSpot. Steganography is a method of hiding information within files, and has been long used by cybercriminals in malicious attacks.… ... Read More
DARPA’s “R3D2” Array – Radio-Frequency Risk Reduction Deployment Demonstration Satellite -- 24 Jan 2019 - R3D2 (not: R2D2) ... laying the groundwork for a revolutionary global space-based internet, validating a resilient sensor and data transport layer in low Earth orbit   New Zealand-based space company Rocket Lab said it plans to launch a satellite for the Defense Advanced Research Projects Agency (DARPA) next month from… ... Read More
Wie gut ist Deutschlands Cyber-Behörde? -- 22 Jan 2019 - von JOANA EKRUTT und CHRISTIAN UNGER --- DIENSTAG, 22. JANUAR 2019 | BERLINER MORGENPOST   "Der Raum, in dem Deutschland seinen Kampf gegen Hacker und Cyberkriminelle gewinnen will, ist gerade so groß wie ein Klassenzimmer." "Die deutsche Cyberabwehr ist ein Flickenteppich. Neben dem BSI haben Polizei und Nachrichtendienste eigene Cyber-Abteilungen,… ... Read More
DNC: Russian Hackers Attacked Us Again After Midterm Elections – NOV 2018 -- 21 Jan 2019 - By Eduard Kovacs on January 21, 2019   Hackers believed to be associated with the Russian government targeted the US Democratic National Committee (DNC) shortly after the 2018 midterm elections, court documents show. The DNC, the formal governing body for the U.S. Democratic Party, was targeted by hackers in 2015… ... Read More
Zombies: Rate of Cybersecurity Venture Funding Not Sustainable, Investors Say -- 19 Jan 2019 - By Kevin Townsend on January 18, 2019   Venture capital firm Strategic Cyber Ventures (SCV) considers itself a part of the overall security industry. "First and foremost we are cyber operators," it states on its website. "We advance cybersecurity through expert investment in synergistic teams and technology solving the world's… ... Read More
On the Pentagon’s Wish List: Warp Drives and Invisibility Cloaks -- 18 Jan 2019 - Space is a hostile environment. Most of the hostility is inherent — a void cannot itself be accommodating to humans, and the projects that do sustain human life in orbit do so by creating tiny livable pockets, encased in proverbial tin cans. That space could be a vector for other… ... Read More
Every Minute $1.1 Million is Lost to Cybercrime ($600 billion a Year) -- 18 Jan 2019 - With cybercriminals costing the global economy $600 billion last year alone, RiskIQ once again took a closer look at the growing volume of malicious activity on the internet during a single “internet minute.” Every single minute: Businesses spend $171,233 to defend themselves Yet, close to $1,138,888 is lost to cybercrime… ... Read More
Phishing: Hacking the USA Power Grid -- 18 Jan 2019 - The kill chain, the phishing attack and the broken trust graph Anshu Sharma - Jan 17, 2019 The Wall Street Journal published an explosive story about how state-sponsored Russian hackers used a variety of techniques and a spider web of compromised accounts to ultimately gain access to the control infrastructure that… ... Read More
“GAPS”: DARPA Explores New Computing Architectures to Deliver Verifiable Data Assurances -- 17 Jan 2019 - Program seeks to create new software and hardware architectures that provide physically provable assurances around data security and privacy outreach@darpa.mil - 1/16/2019 DARPA created the Guaranteed Architecture for Physical Security (GAPS) program to develop scalable solutions that provide safe, verifiable methods of tracking information and communications between computer systems. The… ... Read More
Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware -- 16 Jan 2019 - GRIM SPIDER is a sophisticated eCrime group that has been operating the Ryuk ransomware since August 2018, targeting large organizations for a high-ransom return. This methodology, known as “big game hunting,” signals a shift in operations for WIZARD SPIDER, a criminal enterprise of which GRIM SPIDER appears to be a… ... Read More
DARPA probes tech to solve supply chain uncertainty -- 14 Jan 2019 - By Derek B. Johnson - Jan 10, 2019 The US federal government is worried about possible consequences of vulnerabilities in the global electronics and IT supply chain. The Department of Homeland Security and the intelligence community are leading efforts to persuade tech companies to fundamentally alter the way they do… ... Read More
The United States and China – A Different Kind of CyberWar -- 14 Jan 2019 - By Kevin Townsend on January 07, 2019 China is Conducting a Low and Slow Cyberwar, Attempting to Stay Under the Radar and Maneuver the Global Economy The potential for cyberwarfare between the United States and Russia is openly discussed, and – if not actually defined – is well understood. The… ... Read More
Blacklisted Kaspersky Tipped NSA on Its Largest Security Breach Ever -- 14 Jan 2019 - By AFP on January 11, 2019 The computer security firm Kaspersky Lab helped the US NSA spy agency uncover one of its worst-ever security breaches -- one year before the US banned the company's products for government use, US media has reported. Politico and the Washington Post said the Moscow-based… ... Read More
Kampf gegen Cyber-Crime: warum dem Bund die IT-Experten ausgehen -- 09 Jan 2019 - Laut McAfee Deutschlandchef fehlen bis zum Jahr 2020 etwa 160.000 Sicherheitsspezialisten.   Berlin will für mehr Cybersicherheit sorgen. Allein das Bundesamt für Sicherheit in der Informationstechnik soll 350 neue Stellen erhalten. Nur: Woher sollen die Fachkräfte kommen? das Bundeskriminalamt, das Kommando Cyber- und Informationsraum der Bundeswehr (KdoCIR), die zentrale Stelle… ... Read More
Massive German hack: 20-year-old admits mass doxing politicians, journalists, celebs -- 08 Jan 2019 - (Vlad's comment nails it.)   Police have found the likely culprit of last week's big leak of high-profile personal data. A 20-year-old German man has confessed to being the culprit behind the massive leak of German politicians', journalists', and celebrities' personal data that shocked the country's political class last week. Police… ... Read More
The 10 Best Military Technology Innovations of 2018 -- 05 Jan 2019 - Many leading military technology advances have been achieved during 2018.  US Army scientists and army sponsored researches have succeeded in developing intriguing technologies supporting the soldier of the future.  Dr. Alexander Kott, Chief Scientist of the RDECOM Research Laboratory, the Army’s corporate research laboratory (ARL), which focuses on innovation to… ... Read More
GAO Report Confirms Major Gaps In US Government Cybersecurity -- 05 Jan 2019 - A watchdog agency report says that the U.S. government and its infrastructure remain vulnerable in at least a thousand ways to cyberattacks   The U.S. government has gotten pretty good, or at least pretty productive, over the past couple of decades at laying out, in multiple reports, plans, strategies and… ... Read More
Berlin Digital -- 04 Jan 2019 - Berliner Zeitung · Nummer 3 · Freitag, 4. Januar 2019                 ... Read More
The MOST System: Scientists can now bottle solar energy for 18 years, turn it into liquid fuel -- 26 Dec 2018 - Researchers have invented a liquid isomer that can store and release solar energy. The team has solved problems other researchers have previously encountered. The discovery could lead to more widespread use of solar energy. In the last year, a team from Chalmers University of Technology, Sweden, essentially figured out how… ... Read More
Cybersecurity CEO Robert Herjavec: We Need To Secure A Massively Expanding Cyber-Attack Surface -- 21 Dec 2018 - Cybersecurity CEO Robert Herjavec. PHOTO: Cybercrime Magazine.   The rapid digital transformation and IoT will increase the risk. Great quote: “What people don’t get about the threat landscape is, it’s less about the techniques and more about the attack surface, and the number of openings that have been created.” --… ... Read More
James Mattis, the last “adult” in the Trump administration, resigns as defense secretary -- 21 Dec 2018 - James Mattis will leave his post as the secretary of defense at the end of February.   Gen James Mattis, the highly regarded chief of 3 million DoD personnel, steps down Secretary of Defense James Mattis resigned on Thursday, writing in an unsparing letter that he was stepping down because… ... Read More
CENTCOM chief: The future of warfare demands more cyber authorities -- 20 Dec 2018 - Gen. Joseph Votel, head of U.S. Central Command   The Pentagon has received more power to conduct cyber operations in the past 18 months. But for the top Army commander in the Middle East and Central Asia, the new authority is not enough. The head of U.S. Central Command, Gen.… ... Read More
Marines look for IBM Watson-like Artificial Intelligence -- 20 Dec 2018 - The Marines are looking to big data analysis and potentially an IBM Watson-like machine or software to help conduct complex wargaming and plan for future battles in an immersive environment. The Corps’ Program Manager for Wargaming Capability, Col. Ross Monta, told Marine Corps Times that a recent program announcement seeks… ... Read More
New machine learning algorithm breaks text CAPTCHAs easier than ever -- 20 Dec 2018 - Algorithm tested against the text CAPTCHA systems used on 33 popular websites. Academics from UK and China have developed a new machine learning algorithm that can break text-based CAPTCHA systems with less effort, faster, and with higher accuracy than all previous methods. This new algorithm -developed by scientists from Lancaster… ... Read More
EU Investigating Report of Massive Hacking on Diplomatic Cables -- 19 Dec 2018 - By Natalia Drozdiak - December 19, 2018 The European Union is investigating "a potential leak of sensitive information" following a report that hackers breached the bloc’s diplomatic communications network. Using techniques similar to those used by an elite unit of China’s People’s Liberation Army, hackers downloaded cables over a period of… ... Read More
To Catch a Hacker: Toward a Comprehensive Strategy to Identify, Pursue, and Punish Malicious Cyber Actors -- 19 Dec 2018 - This is a good, needed and depressive read. I quote: ‘Only 3 in 1000 cyber incidents see an arrest’ and ‘Malicious cyber actors are rarely caught and the effort to do so is uncoordinated, under-resourced, and under-prioritised’. -- Troels Oerting There are so many things which can be done practically… ... Read More
Informationskrieg: Hier die NSA, dort die Trolle -- 19 Dec 2018 - Zwischen Russlands Einmischung in den US-Wahlkampf und der Internetüberwachung durch NSA und GCHQ gibt es Parallelen: Amerikaner und Briten machten das physische Netz zur Waffe, die Russen seine Anwendungen. Eine Analyse von Patrick Beuth - 18 DEC 2018 Als 2013 die Snowden-Enthüllungen begannen, war die Fachwelt keineswegs von der Tatsache… ... Read More
ExoWarfare done miserably: “Internet Research Agency” (IRA) Russia – Human Trolls -- 18 Dec 2018 - Internet Research Agency Die Bilanz der "Trollfabrik" von Mathias Brandt - 18.12.2018 Die Internet Research Agency (IRA) ist ein Unternehmen aus Sankt Petersburg, dass als "Trollfabrik" der russischen Regierung gilt. Eine aktuellen Studie des an der Oxford-Universität angesiedelten Computational Propaganda Research Projects (COMPROP) zufolge haben die Propaganda-Experten der IRA während… ... Read More
Mathematicians Seal Back Door to Breaking RSA Encryption -- 18 Dec 2018 - Digital security depends on the difficulty of factoring large numbers. A new proof shows why one method for breaking digital encryption won’t work. "... it’s nearly impossible to find polynomials of that length that can be factored" (*) (**) (*) 'nearly'   (**) with today's computers - not tomorrow's QC  … ... Read More
Russia’s “Carnivora” Drone Is Designed For A Drone-Eat-Drone World In Denied Environments -- 18 Dec 2018 - What better tool to stop a drone than a drone? While the Carnivora won’t be catching any Predators, the new counterdrone robot is built to hunt much smaller, more immediate airborne pray. Announced on Dec. 13, 2018, the robot is produced by Russia’s Mikran and has a stated mission to… ... Read More
Brillouin Lasers: DARPA created the Precise Robust Inertial Guidance for Munitions (PRIGM) program to enable positioning, navigation, and timing (PNT) in GPS-denied environments -- 18 Dec 2018 - Since the early 1990s, guided munitions have allowed the U.S. military to precisely strike targets from afar. Today, in an era of robust electronic warfare and GPS-denial, that capability is no longer assured. DARPA created the Precise Robust Inertial Guidance for Munitions (PRIGM) program to develop inertial sensor technologies that… ... Read More
Tor Project Releases Financial Documents of Government Funding -- 18 Dec 2018 - The Tor Project, the organization behind the Tor anonymity network, has published financial documents for the past two years, and while they show that its revenue has increased significantly, it’s still small compared to the budgets of potential adversaries. According to the Tor Project, its revenue in 2015 and 2016… ... Read More
Iran Hackers Hunting Down Nuke Workers and US Officials after New Sanctions -- 18 Dec 2018 - LONDON — As U.S. President Donald Trump re-imposed harsh economic sanctions on Iran last month, hackers scrambled to break into personal emails of American officials tasked with enforcing them, The Associated Press has found — another sign of how deeply cyberespionage is embedded into the fabric of U.S.-Iranian relations. The… ... Read More
R&D Spending Per Country -- 17 Dec 2018 - (right-click and select "view image" to see the full size)       ... Read More
Intelligent Machines: “ODE Solver” – A Radical New Neural Network Design Could Overcome Big Challenges In AI -- 12 Dec 2018 - Researchers borrowed equations from calculus to redesign the core machinery of deep learning for modeling continuous processes. by Karen Hao December 12, 2018 David Duvenaud was working on a project involving medical data when he hit upon a major shortcoming in AI. An AI researcher at the University of Toronto,… ... Read More
Deutschland sichert sich Zugang zum größten Lithium-Vorkommen weltweit -- 12 Dec 2018 - Bolivien mit dem Salzsee 'Salar de Uyuni' gilt als eines der Länder mit dem größten Lithium-Vorkommen weltweit   Mittwoch, 12. Dezember 2018 Griff nach "weißem Gold" Deutschland sichert sich Lithium-Zugang Für die Elektromobilität ist es eines der wichtigsten Rohstoffe überhaupt: Lithium. Erstmals gründet Deutschland nun eine deutsch-bolivianische Firma - und… ... Read More
EU Agrees on Cyber Security Agency – New ENISA Mandate and European Cybersecurity Certificates -- 12 Dec 2018 - European Commission - Press release EU negotiators agree on strengthening Europe's cybersecurity Brussels, 10 December 2018 . This evening, the European Parliament, the Council and the European Commission have reached a political agreement on the Cybersecurity Act which reinforces the mandate of the EU Agency for Cybersecurity, (European Union Agency… ... Read More
What if the military relied on digital twins? -- 07 Dec 2018 - What if the U.S. Department of Defense had a computer model so supremely detailed, it could reproduce exactly the operations of a complex military system? If the Pentagon ran the alongside real-world applications, leaders would know when systems were working properly, and when they were going awry. Navy leaders say… ... Read More
How an Electro-Magnetic Pulse (EMP) Event Could Cause Chaos in Modern Society -- 06 Dec 2018 - By Kenneth L. Williams, Ph.D., CISSP, ITiLv3 Executive Director, Center for Cyber Defense, American Public University System The threat of an Electromagnetic Pulse (EMP) event and its potential impact on millions of people is highly probable and currently unmanageable. This reality is amplified, given the level of dependency of the… ... Read More
Is Near-Instant Satellite Imagery Almost Here? -- 06 Dec 2018 - Intelligence analysts and soldiers on the battlefield could have access to near real-time imagery from commercial satellites as soon as 2021 thanks to new industry partnerships. Amazon Web Services unveiled Nov. 28 a new product named AWS Ground Station, which includes parabolic antennas at 12 locations across the globe. Those… ... Read More
Can DARPA Crack Blockchain? -- 06 Dec 2018 - The Defense Advanced Research Projects Agency (DARPA) is looking into an implementation of the blockchain that could fundamentally alter how sensitive military systems are secured. 06 DEC 2018 DARPA wants to know if it can do anything with blockchain DARPA is known for seeing futures first, and then making them… ... Read More
Cybersecurity Workforce Demand – Infographic via NIST -- 06 Dec 2018 -   from: https://www.linkedin.com/feed/update/activity:6476269122387873792/ ... Read More
DARPA Funds Bio-Tech To Test Organ Tissue In Lieu Of Humans -- 06 Dec 2018 - Creating a human-on-a-chip is the goal What if we could test new drugs without human and animal trials? See also "Lung On A Chip" by Harvard's Wyss Institute (below)   Scientists at the Massachusetts Institute of Technology, with funding from the Department of Defense, want to speed up the clinical… ... Read More
Facebook uses Android update to pry into your private life in ever more terrifying ways -- 06 Dec 2018 - Internal Facebook documents highlight how valuable user data is The social network denies selling people's data, but documents show the company considered charging developers access to its platform. by Katie Collins, Queenie Wong December 5, 2018 6:37 AM PST Facebook isn't just a social network for posting vacation photos or… ... Read More
The Advanced Persistent Threat (APT) Wiki (Overviews, Groups and Solutions) -- 30 Nov 2018 - See also: CyberWarfare Resources   APT Attacks Overview 334 zero-days were used in APT attacks since 2006 What on Earth is an APT? RedBaldKnight/Bronze Butler APT are discovered using malware with sophisticated stego Zero-day in newly patched Adobe Acrobat was used in APT spotted by ESET APT's-The New Age Intruders… ... Read More
DARPAs ‘CODE’: UAS Autonomy and Collaboration without GPS and COMs in A2AD Theatres -- 29 Nov 2018 - Collaborative Operations in Denied Environment (CODE) - artist’s concept   In a recent test series at Yuma Proving Ground in Arizona, DARPA’s Collaborative Operations in Denied Environment (CODE) program demonstrated the ability of CODE-equipped Unmanned Aerial Systems (UASs) to adapt and respond to unexpected threats in an anti-access area denial… ... Read More
DARPA’s Hail Mary Plan ‘RADICS’ to Restart a Hacked US Electric Grid – If Even Possible -- 29 Nov 2018 - One of the recovery tools in development for surveying a grid from above is simply a balloon utilities can launch to detect live power (not reliable in the bad weather) among the more than 900 independent utilities around the US.   by Lily Hay Newman - 14 NOV 2018 In… ... Read More
DARPA-sponsored: Meet the E-Nose That Actually Sniffs – “TruffleBot” -- 28 Nov 2018 - TruffleBot identifies smells by measuring small changes in air pressure and temperature   by Megan Scudellari - 26 OCT 2018 An electronic nose typically identifies odors by detecting the “fingerprint” of a chemical compound across an array of sensors monitored by pattern-recognition software. E-nose technology is already in use across many… ... Read More
DARPA ‘ALIAS’: Learn To Fly Sikorsky’s New Helicopter In Just 45 Minutes With Matrix Technology -- 28 Nov 2018 - Matrix Technology is the name of Sikorsky’s program for rotorcraft that minimize, or even eliminate, the role of the human pilot. Part of Darpa's ALIAS program: Aircrew Labor In-Cockpit Automation System   By Jack Stewart - 01 NOV 2018 With the possible exception of Tom Cruise, learning to fly a… ... Read More
Who needs Copernicus if you have machine learning? -- 27 Nov 2018 - It took humanity centuries to decide that Earth orbits the sun. Now a neural network has come to the same conclusion, using the same data, in just a few hours!   Intelligent Machines Who needs Copernicus if you have machine learning? It took humanity centuries to decide that Earth orbits… ... Read More
DARPA to Host Permissionless Blockchain Workshop On 14-15 FEB 2019 -- 25 Nov 2018 - The U.S. Defense Advanced Research Projects Agency (DARPA) will host a two-day blockchain workshop in February, according to an official request for information (RFI) posted Nov. 19. DARPA, the research arm of the U.S. Department of Defense, is looking to investigate technologies for distributed consensus during a workshop “tentatively scheduled… ... Read More
Europol Online Shopping Tips -- 25 Nov 2018 - It seems so obvious, yet so many ignore the basics - good summary.         ... Read More
Does Not Compute: Japan Cyber Security Minister Admits Shunning PCs -- 23 Nov 2018 - A Japanese minister in charge of cyber security has provoked astonishment by admitting he has never used a computer in his professional life, and appearing confused by the concept of a USB drive.     Yoshitaka Sakurada, 68, is the deputy chief of the government's cyber security strategy office and… ... Read More
Hackers Earn $1 Million for Zero-Day Exploits at Tianfu Cup Chinese Competition: Microsoft, Chrome, Safari, macOS, iPhone, Oracle, VMware, Adobe -- 23 Nov 2018 - White hat hackers earned more than $1 million for exploits disclosed at the Tianfu Cup PWN hacking competition that took place on November 16-17 in Chengdu, the capital of China's Sichuan province. The contest ran alongside the Tianfu Cup conference and is similar to Zero Day Initiative’s Pwn2Own – they… ... Read More
Boing’s Odysseus: Huge, High-Altitude ‘Pseudo-Satellite’ (HAPS) Will Stay Up For Months Above 60,000 Feet (18 Km) -- 23 Nov 2018 - The Odysseus is one of the biggest unpiloted aircraft ever built; the solar-powered Odysseus unmanned aerial vehicle can fly above 60,000 feet (18 km) for three months or more at a time. High-flying drones like Odysseus could be especially useful for military applications.   Nov. 21, 2018 / 6:31 PM… ... Read More
‘Cannon’: Infamous Russian Hacking Group Used New Trojan in Recent Attacks -- 23 Nov 2018 - A well known Russian state-sponsored cyber-espionage group has used a new Trojan as a secondary payload in recent attacks targeting government entities around the globe, Palo Alto Networks reports.  Also known as APT28, Fancy Bear, Pawn Storm, Sednit and Strontium, the Sofacy group is believed to have orchestrated the attacks… ... Read More
The US Finally Has a Defense Agency Devoted to Cybersecurity -- 21 Nov 2018 - Here's everything you need to know about CISA   Lights Out In July, officials from the Department of Homeland Security (DHS) confirmed a very scary rumor: hackers working for the Russian government had hacked the U.S. power grid, gaining a level of access at which they could have cut off power to U.S.… ... Read More
Department of Disqualified: Fixing the Broken Military Medical Accessions Process -- 20 Nov 2018 - This affects most militaries, not just the US Army - and it often holds true for those applicants, for whom the military should be bending over backwards to enlist, such as: an Army effort to directly commission and provide recruitment bonuses to cyber warriors   by Joe Schuman If discontent… ... Read More
Why Would A Blockchain Company (Consensys) Buy A Satellite Company (Planetary Resources)? -- 20 Nov 2018 -   by Gedalyah Reback It’s been two weeks since ConsenSys entered the satellite business. It befuddled the company’s observers to see a blockchain company, tasked with promoting Ethereum’s use, lay down what was likely hundreds of millions of dollars to buy one of the world’s premiere space startups. But the… ... Read More
Machine Learning Can Create Fake ‘Master Key’ Fingerprints -- 20 Nov 2018 - Just like any lock can be picked, any biometric scanner can be fooled. Researchers have shown for years that the popular fingerprint sensors used to guard smartphones can be tricked sometimes, using a lifted print or a person's digitized fingerprint data. But new findings from computer scientists at New York… ... Read More
Pentagon Frustrated By Silicon Valley Rejection: Joint Chiefs Chairman Gen Joe Dunford -- 19 Nov 2018 - Google, Microsoft, et al will not work with US Military, but does work with China.   HALIFAX: The Chairman of the Joint Chiefs expressed frustration Saturday (17 NOV 2018) over the refusal of some tech giants to work with the US military. “I have a hard time with companies that are… ... Read More
Spy Agencies Have Banned Lenovo Computers, Fearing Chinese Hardware Hacks -- 18 Nov 2018 - It pains me to share this, as I am myself a huge fan of Thinkpads. Yet, we have to face reality - (for a long time) they are not IBM anymore.   No Thinkpad for you, NSA employee. July 29, 2013 (!) Lenovo is either the world's biggest or second-biggest… ... Read More
NATO To ‘Integrate’ Offensive Cyber By Members Into Its New Cyber Operations Center (CYOC) -- 18 Nov 2018 - "NATO is clear that we will not perform offensive cyberspace operations," said Maj. Gen. Wolfgang Renner. "However, we will integrate sovereign cyberspace effects from the allies who are willing to volunteer."   WASHINGTON: While NATO won’t conduct offensive cyber operations as an alliance, it will coordinate cyber attacks any of… ... Read More
DARPA Announces 2019 AI Colloquium on March 6-7, 2019 in Alexandria, VA -- 18 Nov 2018 - Scientific defense community to convene and learn about agency’s robust R&D efforts in artificial intelligence outreach@darpa.mil 11/16/2018 Throughout DARPA’s history, artificial intelligence (AI) has been an important area of groundbreaking research and development (R&D). In the 1960s, DARPA researchers completed some of the foundational work in the field, leading to… ... Read More
US NPPD is Now the Cybersecurity and Infrastructure Security Agency (CISA) -- 17 Nov 2018 - On Monday, November 12, the US House of Representatives agreed to a Senate version of the Cybersecurity and Infrastructure Security Agency Act. The bill, which is expected to be signed into law, will give the National Protection and Programs Directorate (NPPD) a new name: the Cybersecurity and Infrastructure Security Agency… ... Read More
The US Army’s New Camouflage Will Hide Soldiers And Tanks In Plain Sight Wherever They Are -- 16 Nov 2018 - The new $480m program aims to replace outdated camouflage that protect soldiers in the visible spectrum but not against more advanced, high-end sensors. ULCANS “provides more persistent [infrared], thermal & counter-radar performance”.   The U.S. Army is moving forward on next-generation concealment technology to ensure that American soldiers can hide… ... Read More
Quantum ‘Compass’ Promises Navigation Without Using GPS -- 13 Nov 2018 - It could keep society humming when satellites fail.   [UPDATED 14 NOV: "Norway says Russia jammed GPS signal during NATO drill" (scroll down) ] [UPDATED 16 NOV: "GPS disrupted for maritime in Mediterranean, Red Sea" (scroll down) ]   GPS is vital to modern navigation, but it's extremely fragile. Never… ... Read More
The CIA’s communications suffered a catastrophic compromise. It started in Iran. -- 08 Nov 2018 - Previously unreported - published 02 NOV 2018   A bloody example of why Cyber Security is so important - and if the CIA and US Intelligence Community cannot secure their own, why do we (in the EU) rely mostly on the same technology they use?   In 2013, hundreds of… ... Read More
2018 Ranking: Top 5 Cities To Startup In Europe According To Founders -- 08 Nov 2018 - Berlin is appreciated for its startup ecosystem as it receives 91% approval rate from its followers on this feature. For founders from Central Eastern Europe (54%) and Western Europe (42%), Berlin remains the most desired place to startup.   Since 2016, Startup Heatmap Europe has asked over 3000 founders, startup… ... Read More
National Geospatial-Intelligence Agency (NGA): Army Announces New Director of Operations -- 30 Oct 2018 - Maj. Gen. Charles H. Cleveland has been assigned as the next director of operations at the National Geospatial-Intelligence Agency, according to an Oct. 29 release from the Army’s chief of staff. In the new role, Cleveland will oversee the NGA’s worldwide operational support and the execution of the agency’s mission… ... Read More
Berlin Science Week & Helmholtz Horizons Symposium 1. to 10. NOV 2018 -- 29 Oct 2018 - Ab dem 1. November findet für 10 Tage die Berlin Science Week vom 1.11. bis 10.11. statt: "BERLIN SCIENCE WEEK 1-10 NOV 2018 is an international gathering, bringing together people from the world’s most innovative scientific institutions in Berlin. It is dedicated to the dialogue between science and society to… ... Read More
Stinger Missile Upgrade Brings One Hundred Percent Hit-Rate -- 29 Oct 2018 - The Stinger missile is the U.S. military’s main short-range air defense weapon, featuring in-flight guidance and an almost 0.5 kg warhead that sends shrapnel ripping through planes, helicopters, other low-flying vehicles and, when necessary, even ground vehicles. Recently, the missile’s manufacturer has created a new proximity fuse for the weapon,… ... Read More
Heathrow 2019: World’s Largest Deployment of Biometric Systems -- 29 Oct 2018 - Manual authentication in airports means that passengers need to present different forms of ID such as boarding cards, booking reference numbers as well as their passports to different agents to show that they’re authorized to travel. These processes take a lot of time. IATA research shows that 64% of passengers… ... Read More
“FlyCroTug” Drones: Who Needs Thumbs? Not These Drones! -- 27 Oct 2018 - It’s an image maybe just as absurd as swallows carrying coconuts, but a reality infinitely more useful. A pair of small drones with winches and hooks work together to open a door, manipulating an object 40 times their own mass. The technique is novel, inspired by wasps, and suggests new… ... Read More
US to Let NATO Use Its Offensive Cyber Defense Skills -- 25 Oct 2018 - NATO Cooperative Cyber Defense Center   The United States is expected to make its offensive cyber warfare capabilities available to NATO, officials said Wednesday, as the alliance seeks to strengthen its defenses against Russian electronic attacks. Britain and Denmark have already publicly committed cyber resources to NATO, and Washington is… ... Read More
Hackers Earn $150,000 in Marine Corps Bug Bounty Program -- 25 Oct 2018 - The U.S. Department of Defense’s sixth public bug bounty program, Hack the Marine Corps, has concluded, and white hat hackers who took part in the challenge earned more than $150,000. Hack the Marine Corps was hosted by the HackerOne bug bounty platform and it ran for 20 days. Over 100… ... Read More
Russia’s Hackers Long Tied to Military And Secret Services -- 25 Oct 2018 - During the Soviet era, the country's top computer scientists and programmers largely worked for the secret services. That practice appears to have resumed under President Vladimir Putin, as Russia faces accusations of waging a global campaign of cyber attacks. Dutch officials on Thursday accused four Russians from the GRU military… ... Read More
IoT Security: California Bill Requires Unique Passwords From Manufacturers in Connected Devices -- 25 Oct 2018 - The state of California recently passed a bill that requires the manufacturers of connected devices to use unique hardcoded passwords for each device manufactured. The bill, meant to combat the widespread use of weak passwords in connected devices such as Internet of Things (IoT) products, also demands that manufacturers implement… ... Read More
Cybersecurity Predictions: More Cyberattacks, Social Engineering, And Scary IoT -- 25 Oct 2018 - CNET's Dan Patterson interviewed Kevin Mitnick, a former most wanted computer criminal, and now the founder of Mitnick Security Consulting and chief Hacking Officer of the security awareness training company KnowBe4, about emerging cybersecurity trends and how we can prepare for attacks. The following is an edited transcript of the… ... Read More
Sinking Container Ships By Hacking Load Plan Software -- 25 Oct 2018 - Load planning Speed and efficiency is everything with containerised shipping. The Container Load Plan (also known as a bay or stowage plan, or Ship Planning System) is a key part of that.     I’ll explain the detail of the messaging format in a separate blog about BAPLIE EDIFACT syntax.… ... Read More
The DNC Hacker Indictment: A Lesson in Failed Misattribution -- 25 Oct 2018 - Reading legal documents is not something I usually enjoy. The Muller indictment of the Russian DNC hackers was different - the amount of detail revealed in the document stunned me, and suggests that the US had very deep visibility into the hackers’ operations. In this article I am not going… ... Read More

By continuing to use this site, you agree to the use of cookies. Please consult the Privacy Policy page for details on data use. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close