Advertisements


Musk Warns Against ‘Arms Race’ in Autonomous Weapons

Elon Musk, the billionaire behind such companies as electric car-maker Tesla and rocket-maker SpaceX, this week joined other experts in the field of artificial intelligence... Elon Musk, the billionaire behind such companies as electric car-maker.....»»

Source:  DefensetechCategory: Security11 hr. 9 min. ago Related News

Another MQ-1 Predator Drone Crashes in the Middle East

A U.S. Air Force MQ-1 Predator drone crashed after takeoff from Incirlik Air Force Base, Turkey, on Monday — just four days after the same... A U.S. Air Force MQ-1 Predator drone crashed after takeoff from Incirlik Air Force Base, Turkey, o.....»»

Source:  DefensetechCategory: SecurityAug 22nd, 2017Related News

US Army Close to Decision on Shielding Abrams Tanks with Israeli Tech

Aberdeen, MD. — The Israelis call it the “Windbreaker” that already is protecting their Merkava 4 tanks against rocket-propelled grenades and anti-tank missiles, and now... Aberdeen, MD. — The Israelis call it the “W.....»»

Source:  DefensetechCategory: SecurityAug 21st, 2017Related News

This Drone-Maker Armed a Quadcopter with a Sniper Rifle

A small Florida company has outfitted a quadcopter with a sniper rifle, grenade launcher and other small arms — and wants to sell the technology... A small Florida company has outfitted a quadcopter with a sniper rifle, grenade launcher and.....»»

Source:  DefensetechCategory: SecurityAug 18th, 2017Related News

US, China and the UK are top regions affected by IoT security threats

In the Internet of Things (IoT) ecosystem today, cyberattacks are becoming more diverse and sophisticated with cybercriminals taking over home network routers to launch attacks on smart home devices. Trend Micro’s recent report shows more than 1.8.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

Uber to get privacy audit every two years

Uber has agreed to implement a comprehensive privacy program and obtain regular, independent audits to settle Federal Trade Commission charges that they deceived consumers by failing to monitor employee access to consumer personal information and by.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

DOJ wants to know who visited anti-Trump website

The US Department of Justice wants DreamHost to hand over IP addresses of some 1.3 million visitors to disruptj20.org, a website that helped organize political protests during President Trump’s inauguration. The company has decided to challenge.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

EV ransomware is targeting WordPress sites

WordPress security outfit Wordfence has flagged several attempts by attackers to upload ransomware that provides them with the ability to encrypt a WordPress website’s files. They dubbed the malware “EV ransomware”, due to the .ev exten.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

Three megatrends that will drive digital business into the next decade

Gartner revealed three distinct megatrends that will enable businesses to survive and thrive in the digital economy over the next five to 10 years. Artificial intelligence (AI) everywhere, transparently immersive experiences and digital platforms are.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

Google Chrome remote code execution flaw detailed, PoC released

Vulnerability broker Beyond Security has released details about and Proof of Concept code for a remote code execution bug affecting Google Chrome. “The [type confusion] vulnerability results from incorrect optimization by the turbofan compiler,.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

DevOps skills gap: Do you have the necessary skills to succeed?

New research shows that software developers are not receiving the training they need to be successful as DevOps becomes the prevalent approach to building and operating digital products and services. In today’s application-centric economy that gap.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

The human point: Gaining visibility into the context behind user actions

In this podcast recorded at Black Hat USA 2017, Dr. Richard Ford, Chief Scientist at Forcepoint, talks about the security industry’s need of a paradigm shift toward examining user behavior and intent. Here’s a transcript of the podcast fo.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

How to spot malicious mobile apps

The pervasiveness of smartphones has resulted in an onslaught of mobile apps, and it’s pretty safe to say that, by now, there is an app for every imaginable purpose. Unfortunately, among the many helpful ones are also many malicious apps –.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

NotPetya aftermath: Companies lost hundreds of millions

The infamous NotPetya ransomware attack, which started in Ukraine on June 27 but later spread to many international businesses, has resulted in huge monetary losses for the victims. Even those who paid the ransom couldn’t recover swiftly, as it.....»»

Source:  NetsecurityCategory: SecurityAug 17th, 2017Related News

WATCH: Soldiers Test-Fire New 30mm Cannon, Javelin Missile on Stryker

The U.S. Army this week invited reporters to Aberdeen Proving Ground in Maryland to see soldiers test-fire new weaponry on the Stryker combat vehicle, including... The U.S. Army this week invited reporters to Aberdeen Proving Ground in Maryland t.....»»

Source:  DefensetechCategory: SecurityAug 17th, 2017Related News

New Pilot on Navigating F-35 Comms: ‘It Is Extremely Simple’

The F-35 Joint Strike Fighter is one of the most software intensive mission systems ever built that allows it to take in, process and display... The F-35 Joint Strike Fighter is one of the most software intensive mission systems ever built that a.....»»

Source:  DefensetechCategory: SecurityAug 15th, 2017Related News

7 free tools every network needs

In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of th.....»»

Source:  NetworkworldCategory: SecurityAug 15th, 2017Related News

IDG Contributor Network: Can U.S. lawmakers fix IoT security for good?

While the Internet of Things (IoT) has carved out a comfortable place for itself in today’s society and markets, many still fear that the interconnectivity-driven phenomenon is extraordinarily vulnerable to outside attacks. A number of U.S. Sena.....»»

Source:  NetworkworldCategory: SecurityAug 14th, 2017Related News

‘Don’t Look at Flash or Fireball,’ Guam Warns Residents

Guam officials have issued a fact sheet to the island’s 160,000 residents on how best to protect themselves in the event of a nuclear missile... Guam officials have issued a fact sheet to the island’s 160,000 residents on how best to.....»»

Source:  DefensetechCategory: SecurityAug 12th, 2017Related News

‘Hunter-Killer’ Reaper Drone Taking On More Strike Missions in Afghanistan

The MQ-9 Reaper is proving itself to be the workhorse drone of the Air Force, especially in combat zones like Afghanistan. As the service slowly... The MQ-9 Reaper is proving itself to be the workhorse drone of the Air Force, especially in combat.....»»

Source:  DefensetechCategory: SecurityAug 11th, 2017Related News