Sponsored by f

  • CybersecurityNew cybersecurity threat: smartphone apps that do more than what they say they do

    A large proportion of applications contain third-party code with the capability to interact with sensitive data in a way that may not be apparent to users or developers; Apple reviews its applications before accepting them into its App Store, but even that is not foolproof when it comes to detecting erroneous or malicious components within apps, which might end up collecting or storing information that has nothing to do with the intended usage case of the app

  • Identifying future digital leakers, whistle-blowers

    Digital encoding could catch future informants; the Wikileaks saga will likely result in an overhaul of how governments protects information; in addition to using watermarking, government agencies could adapt existing digital-rights-management technologies; such technologies can perform various tasks that might be relevant: identify when the same computer is downloading voluminous amounts of material, restrict downloading to authorized users, and stop users from copying or passing restricted files to other computers

  • Reporting from Black HatATMs easily compromised by hacker at Black Hat

    A disturbingly high percentage of the world’s automated teller machines (ATMs) are vulnerable to physical and remote attacks that can steal administrative passwords and personal identification numbers, to say nothing of cash

  • Huge jump in IED attacks in Afghanistan

    Monthly IED “incidents” in Afghanistan — incidents are defined as IEDs placed by insurgents and either found or detonated — from January 2004 to April 2010 has risen dramatically; data shows that an astounding jump in IED incidents occurred beginning summer 2009 — coinciding with the Marine offensive in the Helmand River Valley — and IED attacks have steadily mounted; there were more than 1,000 IED incidents during March, April, and May of this year; one expert says: data shows “that IEDs have become the equivalent of the Stinger [during the mujahedin war against the USSR in the 1980s] in allowing irregular forces to pose a major threat even to the most advanced military forces in the world”

  • Engineering graduate schools address homeland security

    In response to a variety of recent disasters — including high-profile hurricanes, terrorist attacks, and structural collapses — some graduate engineering schools are creating new courses of study that teach students how to address these catastrophes

  • Nuclear mattersU.S. nuclear weapons detection skills, capabilities deteriorate

    The world is increasingly worried about nuclear weapons proliferation, so it is not good to read that a National Research Council (NRC) report warns of “concerns” over deteriorating U.S. expertise in detecting and investigating nuclear weapons; the shortage of nuclear forensics specialists could have dire consequences says the NRC: “Beyond the terrible loss of life, which in itself is difficult to appreciate fully, the successful detonation of one or more nuclear explosives in a U.S. city and the potential for more detonations could transform our nation into a national security state, focused on common defense to the detriment of the justice, general welfare, and blessings of liberty envisioned by our nation’s founders”