Cyberagentur kommt – mit strengen Auflagen

Cyberagentur kommt – mit strengen Auflagen

von Lina Rusch – veröffentlicht am 15.11.2019 Nach monatelangem Streit gibt es nun grünes Licht für die Cyberagentur. Die Auflagen für diese besondere GmbH sind allerdings streng. Und die Führungsfrage ist weiter offen – doch es zeichnet sich eine Personalie ab. Im Haushaltsausschuss ging gestern Abend der monatelange Streit zwischen den Koalitionsfraktionen zur Cyberagentur zu…

Programming languages: Python overtakes Java on GitHub as Google Dart use soars

Programming languages: Python overtakes Java on GitHub as Google Dart use soars

Developers love Python, Microsoft’s GitHub says, also revealing the site’s biggest open-source projects. The hit programming language Python has climbed over once-dominant Java to become the second most popular language on Microsoft-owned open-source code-sharing site GitHub. Python now outranks Java based on the number of repository contributors, and by that metric Python is now second…

Google reveals ‘Project Nightingale’ after being accused of secretly gathering personal health records

Google reveals ‘Project Nightingale’ after being accused of secretly gathering personal health records

By Mary Beth Griggs – Nov 11, 2019 Google secretly gathered millions of patient records across 21 states on behalf of a health care provider, in an effort dubbed “Project Nightingale,” reports The Wall Street Journal. Neither the provider’s doctors nor patients were made aware of the effort, according to the report. The Wall Street…

Here’s how US Cyber Command is using ‘defend forward’

Here’s how US Cyber Command is using ‘defend forward’

U.S. Cyber Command is using new authorities to gain insights and access to foreign networks to help better inform defense. (U.S. Cyber Command Public Affairs) U.S. Cyber Command is gaining important insights into malware and adversarial actors by working with partner nations to help secure their systems, according to a top official. “We’re also working…

BKA verzeichnet Anstieg der Cyberkriminalität

BKA verzeichnet Anstieg der Cyberkriminalität

Jeder zweite Befragte zu Beginn des Jahres veröffentlichten Bitkom-Umfrage gab an, in den letzten zwölf Monaten Opfer von Internetkriminalität geworden zu sein. Deutschlandweit registrierte das Bundeskriminalamt allein durch Computerbetrug und missbräuchliche Nutzung von Telekommunikationsdiensten Schäden in Höhe von 61,4 Millionen Euro – dabei dürfte es sich aber nur um einen Bruchteil der tatsächlichen finanziellen Folgen…

Wie Geheimdienste Cyberattacken durchführen

Wie Geheimdienste Cyberattacken durchführen

Symbolbild, echte Geheimagenten tragen natürlich Schlapphüte. Ein Ex-FBI-Agent spricht über staatliche und nichtstaatliche Cyberangriffe, deren Zuschreibung und den Sony-Pictures-Hack. Von Sylvester Tremmel Wie gehen Geheimdienste gegen Cyber-Attacken vor und wie führen sie selber solche Angriffe durch? Auf dem Web Summit in Lissabon hat Andre McGregor (LinkedIn) darüber etwas aus dem Nähkästchen geplaudert. McGregor war früher…

Weaponizing Blockchain — Vast Potential, but Projects Are Kept Secret

Weaponizing Blockchain — Vast Potential, but Projects Are Kept Secret

When Indian Defense Minister Rajnath Singh said that blockchain and artificial intelligence would “revolutionize war,” as Cointelegraph reported on Nov. 4, did he take things a bit too far? Jet engines have revolutionized warfare, and so have missiles and nuclear weapons — but shared digital ledgers? Former NATO Secretary General Anders Fogh Rasmussen, for one,…

Kepler achieves a world-first for satellite broadband with 100Mbps connection to the Arctic

Kepler achieves a world-first for satellite broadband with 100Mbps connection to the Arctic

Small-satellite startup Kepler has done something never before accomplished with satellite-based broadband connectivity: providing a high-bandwidth to the Arctic. Kepler’s nanosatellites have successfully demonstrated achieving over 100Mbps of network speed to a German icebreaker sea vessel that acts as a mobile lab for the MOSAiC research expedition. This is the first time there’s been a…

How the US Air Force plans to find ‘Defense Unicorns’

How the US Air Force plans to find ‘Defense Unicorns’

Dr. Will Roper, Assistant Secretary of the Air Force for Acquisition, Technology and Logistics, said he wants to “start making defense unicorns.” (Alan Lessig/Staff) Dozens of space companies descended on San Francisco, California Nov. 5 for a unique opportunity: the chance to walk away with a same day contract with the Air Force. Opportunities like…

Alike DARPA: Schumer proposes $100B US-tech ‘Moon Shot Agency’ versus China

Alike DARPA: Schumer proposes $100B US-tech ‘Moon Shot Agency’ versus China

Sen. Chuck Schumer is calling for a new, deep-pocketed agency to fund cutting-edge tech development. WASHINGTON ― With an eye on China, the U.S. Senate’s top Democrat is floating plans for a new, deep-pocketed agency to invest $100 billion into cutting-edge technologies like artificial intelligence, quantum computing, robotics and fifth-generation networking known as 5G. Speaking…

So finden Sie ganz leicht den Besitzer einer unbekannten Handynummer heraus

So finden Sie ganz leicht den Besitzer einer unbekannten Handynummer heraus

Wer regelmäßig unbekannte Anrufer hat, sollte im Netz recherchieren, wer dahinter steckt   Schon wieder ein unbekannter Anrufer auf dem Smartphone? Das kann ganz schön nerven: Ist es vielleicht ein Freund mit einer neuen Nummer – oder doch nur wieder der lästige Hotline-Mitarbeiter des Mobilfunkanbieters, der einen neuen Vertrag anpreisen will? Noch schlimmer: Vielleicht klingelt…

Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam

Alexa, Siri, Google Smart Speakers Hacked Via Laser Beam

Smart voice assistants can be hijacked by attackers using lasers to send them remote, inaudible commands. Researchers have discovered a new way to hack Alexa and Siri smart speakers merely by using a laser light beam. No physical access of the victims’ device, or owner interaction, is needed to launch the hack, which allows attackers…

So what problems does the US DoD JEDI Cloud solve, really?

So what problems does the US DoD JEDI Cloud solve, really?

The DoD wants the JEDI cloud to consolidate data for use by the warfighter at the tactical edge. Joint Enterprise Defense Infrastructure program In the months leading up to the Department of Defense awarding Microsoft a multibillion-dollar cloud computing contract, the Pentagon’s senior leaders described pent up demand for a new enterprise cloud. But how…

Murky Details Surround Bed, Bath and Beyond Breach

Murky Details Surround Bed, Bath and Beyond Breach

The housewares giant disclosed a breach with few details – but security researchers have some theories. Housewares and home furnishings purveyor Bed, Bath and Beyond has disclosed a data-thieving cyber attack that allowed the adversaries to access customers’ online accounts. According to a Tuesday SEC filing, the company “discovered that a third party acquired email…