To combat cyber attacks, the U.S. may need more than new cyber defenses. It might need a whole new piece of Internet infrastructure. So says former CIA director Michael Hayden, who served under President G.W. Bush, and he’s not the only one. Several lawmakers and the current Cyber Command chief Gen. Keith Alexander are toying with the notion of creating a “.secure” domain where Fourth Amendment rights to privacy are voluntarily foregone in order to keep that corner of the Internet free of cyber criminals.
The cyber-security cat is slowly slinking out of the bag, it seems. It’s been a big month in cybersecurity news, ranging from some high-profile hacks at companies like Lockheed (home to sensitive American defense technologies) and a declaration from the Pentagon that cyber attacks perpetrated by foreign governments can be considered acts of war and dealt with accordingly.
Hackers used Amazon’s Elastic Cloud Computing service to wage an attack on Sony’s PlayStation network last month, according to a report by Bloomberg News. If it’s true, it’s the first acknowledgement that a cloud service — billed as a cheap, dynamic solution for safely storing data and ramping up processing power — has been used as a platform for a cyber attack.
Flight researchers and computer scientists get all sorts of cool tools to study honeybees, hoping the insects can help point the way to better UAV flight patterns, solutions to computing problems and even environmental monitoring. But what about the bees?
By Benjamin Phelan
Posted 04.04.2011 at 5:33 pm 0 Comments
Nearly 150 hacker spaces have opened in the U.S. in the past three years. Rather than havens of illicit computing, these communal workshops are places for members, in exchange for monthly dues, to get together and share equipment too big and dangerous for a home or garage (oscilloscopes, welding rigs, laser-cutters) and collaborate on projects too audacious to undergo alone (thought-controlled helicopters, helium balloons with autonomous robot pilots).
"Anonymous," a group of hackers perhaps best known for their attacks on the Church of Scientology, have appointed themselves the protectors of Wikileaks. To that end, they've begun a full-scale attack on those who have harmed Wikileaks in the past. This is no cute hacker's mission--it's a full-on crusade that has already taken down Mastercard.com.
I love Maker Faire. I've had a blast with makers and their wild creations in San Francisco and in Austin, but this past weekend, Make's traveling DIY circus came right to my backyard here in NYC. It's a circus that happens to include a pulse-jet-powered merry-go-round, seen here, among other delights. Which is the right kind of circus.
By Ben Paynter
Posted 09.21.2010 at 12:31 pm 7 Comments
Jobs may be scarce today, but if current trends hold, pretty soon there will be plenty of fun, lucrative gigs. If you have the vision to start prepping now, you could be flying starships, reading minds, or manning a fusion reactor. The jobs are coming. Feel free to thank us over lunch at the hotel you built- on Mars.
Using homemade software and a standard computer port, a team of scientists has figured out exactly how easy it is to hack into a modern car -- scary news for motorists already wary of faulty brake and accelerator systems.
The research team wrote code that allows them to turn off the brakes in a moving car, change the speedometer reading, blast hot air or music on the radio, and lock passengers inside the car, PCWorld reports.
Most Chinese citizens may still rely on homegrown Baidu for their Internet search needs, but Google's threatened pullout apparently worries the vast majority of Chinese scientists surveyed by the journal Nature. "If I lose Google, it will [be] just like a man without his eyes," one respondent said.
Washington insiders recently sweated out a real-time war game where a cyberattack crippled cell phone service, Internet and even electrical grids across the U.S. The unscripted, dynamic simulation allowed former White House officials and the Bipartisan Policy Center to study the problems that might arise during a real cyberattack emergency, according to Aviation Week'sAres Defense Blog.
The Policy Center's vice-president reports ""The general consensus of the panel today was that we are not prepared to deal with these kinds of attacks."
A 2007 hacker attack on an Internet café in Hubei Province in China has led to the discovery and dismantling of an online hacker training camp accused of providing malicious software and lessons in hacker technique to tens of thousands of Chinese users.
Whatever the views on cap-and-trade systems for greenhouse gas emissions, everyone can agree that it doesn't work when cyber-thieves fraudulently obtain and resell the carbon credits. The mysterious culprits behind a "phishing" scam managed to make millions off of European allowances that permit companies to emit a certain amount of greenhouse gases per year, according to Der Spiegel.
Over the last two weeks, China and the US have engaged in a round of diplomatic sparring over attacks against Google. Secretary of State Hillary Clinton demanded that China investigate the attacks, while China accused the US of having a hacking double standard, and of using the Internet to foment revolution in Iran. In the ensuing back and forth, Google pulled its operations out of China, and criticized the Chinese government for censoring search results.
A Chinese cyber-assault on Google and more than 30 other U.S. companies was the most sophisticated online attack ever seen outside of the defense industry, according to experts from anti-virus firm McAfee interviewed by Wired. Google announced on Tuesday that it would no longer censor information on its search portal per Chinese government rules, and may stop doing business in China entirely.
Five amazing, clean technologies that will set us free, in this month's energy-focused issue. Also: how to build a better bomb detector, the robotic toys that are raising your children, a human catapult, the world's smallest arcade, and much more.