source: govexec.com

These aren’t your kitchen cabinet granola bars.

NASA is developing a line of high-tech, nutrient-dense food bars for its planned Orion missions into space. They are meant for sustaining space travelers during the two-and-a-half years it will take to fly to Mars and back.

When it comes to packing food on board, engineers hope to save space by stocking more meal replacement food bars, which currently come in at least four flavors: banana nut, orange cranberry, ginger vanilla and barbecue nut. Each bar contains 700-900 calories and is designed to be a substitute for breakfast.

On the International Space Station at the moment, astronauts can choose between about 200 different meal options. But on smaller spacecrafts, where cargo weight and storage space are more tightly controlled to ensure enough room for fuel, the U.S. space agency is looking for ways to maximize efficiencies.

Earthlings use food bars to replace meals on occasion—not always successfully— but there are no reliable products for the long-term, wholesale replacement of meals. “There’s no commercially-available bar right now that meets our needs, so we’ve had to go design something that will work for the crew, while trying to achieve a multi-year shelf-life,” NASA said in a statement.

It’s not just food bars with which the space agency has been experimenting. Engineers are also looking to optimize in-flight management of fresh vegetables, too.

 

source: threatpost.com

A phishing campaign pushing Locky ransomware is targeting some of the 22 million victims of the massive United States Office of Personnel Management breaches of 2014 and 2015.

According to researchers at PhishMe Intelligence, the campaign involves attackers impersonating OPM representatives who are targeting government contractors and workers that have had personal information stolen from them. Attackers are using phishing messages that warn targets that the OPM has detected “suspicious movements” in their bank accounts. The email goes onto ask recipients to “examine the attached scanned record.” At the bottom of the phishing attack messages is the email signature of Elis Lucas, account manager with the U.S. Office of Personnel Management.

The attachment is a zip archive that when launched runs a JavaScript application that downloads and runs a sample of the Locky encryption ransomware. The attackers, researchers wrote, are demonstrating their “unscrupulous nature and willingness to exploit the misfortune of others at any step in their delivery and infection process.” PhishMe found 323 unique JavaScript application attachments used in the campaign with the capability of downloading obfuscated Locky payloads from 78 command-and-control payload locations. Of note, PhishMe said, the sample it found contained four hardcoded command-and-control hosts, as well as a single payment site where victims could pay their ransom in Bitcoin in exchange for an encryption key. Locky has been potent since its initial detection on Feb. 16 – with attempts to infect computers in more than 100 countries.

The preferred Locky attack vector has been email messages that contain an attached Word document embedded with a malicious macro. Once the macro is engaged, a script is initiated and Locky is downloaded onto a victim’s PC. The ransomware was used to target hospitals starting with Hollywood Presbyterian Medical Center in Los Angeles, which paid a $17,000 ransom, and this summer was spread by the Necurs botnet.  According to a Check Point analysis of Locky, researchers have documented at least 10 different Locky downloader variants. In those cases, each variant has tried to avoid detection by hiding the Locky payload in different file types (.doc, .docm, .xls and also .js) that claim mostly to be invoice attachments. According PhishMe, “These emails reinforce the fact that overcoming the phishing threat and the ransomware it delivers is not some insurmountable task. Instead, user education and the bolstering of incident response practices can give organizations the edge over threat actors.”


source: defenseone.comhow


A invitation from the Pentagon's mapping arm could be the first of more outreach to early-stage private-sector companies.

One spy agency is moving past a reputation for mysterious activity by actively networking with commercial startups.

The National Geospatial-Intelligence Agency has recently been making deliberate efforts to meet early-stage private sector companies developing technology that might be viable to its multifaceted mission to provide intel for national-security efforts, and humanitarian and relief agencies.

Nextgov spoke with Erwin Godoy, chief innovation strategist at NGA’s Enterprise Innovation Office, about the agency’s broader goals. This conversation has been edited for length and clarity.

Godoy: For the most part, the government has tended to be very passive. We are sought-after customers by our traditional industry. We have traditional windows such as FedBizOpps—that’s usually where we kind of wait and see if people answer our requests.

While that worked for us great in the ‘90s and the first part of the decade … the rate of technological change, the rate of new companies coming out … has just been so fast, coming out of Silicon Valley, often New York, Boston, these hubs are driving innovation in our economy at large. Most of these companies aren’t used to doing business with government; they don’t even know how to start.


 

 

SOURCE:  USATODAY.COM


The new Trump administration could better protect the nation from cyber attacks by teaming with Silicon Valley to boost the cyber workforce and creating an agency to find new ways to safeguard digital security, UC Berkeley's Center for Long-Term Cybersecurity said in recommendations unveiled Friday.

Those ideas were among five major cybersecurity suggestions that the center's experts offered during a panel discussion at the Bipartisan Policy Center. The University of California, Berkeleycenter has reached out to Trump's transition team to offer its advice. Trump has not yet named a cybersecurity adviser.

"The new administration has an important opportunity to change the way Americans think about cybersecurity," the center said in a short report presented by Executive Director Betsy Cooper and Faculty Director Steven Weber. "We believe cybersecurity needs to be thought of as an existential risk to core American interests and values, rising close to the level of major armed conflict and climate change."

Americans have become increasingly aware of cybersecurity threats in the wake of high-profile hacks of major government and private sector groups, including the Democratic National Committee, Yahoo, Target, and the Internal Revenue Service.

But the risk of a major cyber attack carries much darker consequences, including the disabling of the nation's electrical grid and widespread data disruption that could scramble everything from government communications to the online banking websites that many Americans rely on, Weber said.

"Just think about how much of your life is dependent on the assumption that the Internet actually works and is safe," he said.