Modern commercial airliners could be at risk of in-flight cybersecurity attacks through a vulnerability posed by passengers using planes’ wireless systems, warns a federal watchdog agency.
SIGNAL Online Exclusives
The U.S. intelligence community's leading edge in the information-age technology race, particularly in the intelligence, surveillance and reconnaissance domain, has put the Defense Department at a self-imposed disadvantage, marked by some warfighters behind the curve when it comes time to process and analyze the vast amount of information collected.
On the same day that news headlines implicated Russian hackers in a significant cyber attack and breach on the White House, officials attending a cybersecurity summit Tuesday in the nation’s capital warned of the uptick in the number of nation state-sponsored cyber attacks against the U.S. government and businesses.
The notion of nefarious scientists re-engineering the genetics of living organisms to then weaponize their new specimens has some researchers jostling for the upper hand, including those at the U.S. Defense Department’s main research agency.
Experts today trumpet the very same warnings voiced two years ago, when then Vice President Dick Cheney’s heart implant drew public attention and fervor to the mounting warnings of lax cybersecurity on wireless medical devices, some worn and some implanted inside the body.
It will not be long before adversaries narrow the superiority gap the United States holds over others in satellite technology. Rivals are unencumbered by bureaucratic stagnation and can rapidly leverage commercial technology for military use, according to one panelist speaking at the Satellite 2015 symposium in Washington D.C.
The European Union faces the same formidable increase in cyber attacks as the United States—but comes up against issues compounded by disparate national laws and cybersecurity expertise, experts say. While technology might lead to some of the security lapses, humans certainly contribute to the problem.
The U.S. government-backed cybersecurity framework for the nation’s federal agencies and critical infrastructure sector—released one year ago today—has received a general thumbs up of approval from industry experts, who say the NIST guideline is proving a successful advent toward a better understanding of cyber risks and organizations’ vulnerabilities.
Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.
The U.S. is falling behind potential adversaries, such as China and Russia, in key technological areas, warned Frank Kendall, undersecretary of defense for acquisition, technology and logistics, while testifying before the House Armed Services Committee.
President Barack Obama has put the cybersecurity ball into Congress’ court, seeking legislation that pushes what some industry experts have clamored for in the quest to better protect the nation’s information network. The president has unveiled details for new laws toward better cybersecurity, which includes a heavy focus on increased information sharing between government and industry. Some experts have said better protections lacking a robust information-sharing plan—and the related safeguards—between the private sector and government. It's a good start, but not quite enough.
The Twitter and YouTube accounts for the U.S. Central Command, the Defense Department branch responsible for operations in the Middle East and Afghanistan, were hacked by sympathizers of the Islamic State militant group, prompting U.S. officials to suspend the accounts and launch yet another round of investigations into a cybersecurity breach.
Georgia Tech researchers work toward a scanner—similar to a virus scan—for side channel emissions.
As China, Russia and Iran continue to develop capabilities that could circumvent U.S. missile defenses, technology under development by one defense industry contracting giant has piqued the interest of the U.S. Missile Defense Agency.
The U.S. military can get a bird's-eye view of a battlefield or humanitarian mission via use of unmanned aerial vehicles. Now, DARPA is asking for technology that would let the military get into buildings without having troops actually step foot inside.
With the National Geospatial-Intelligence Agency's interactive Map of the World now residing in the cloud, the intelligence agency plans to expand the tools and content.
After witnessing the depressing impact of starvation and lack of medicine for Syrian refugees encamped in Turkey, Maj. Mark Jacobsen, USAF, embarked on a project that he hopes one day will use unmanned aerial vehicles to airdop lifesaving supplies for victims of war-ravaged nations.
Behavioral analytic tools might just open new horizons for better cybersecurity that would let experts better prioritize alerts and collect actionable intelligence, giving them an advantage for more rapid responses to breaches. Or might they open new doors for hackers?
The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.
Technology plays a central role in helping the Department of Veterans Affairs work smarter, not harder, to medically treat veterans, particularly those who live in rural areas of the nation.