Topic:  TECHNOLOGIES




Source:  Lance Ulanoff for Mashable.com

People fear robots are becoming too human, but, in reality, robots are becoming a little more bug-like every day.

A team of Harvard University researchers proved this axiom when they found the solution to extending tiny robot flight is by mimicking the way small bugs alight on walls and ceilings.

The applications for such a robot are wide-ranging, from small spying devices that can conduct surveillance missions while suspended from a ceiling to research drones that can allow scientists to take measurements where no other sensors can physically go.

For the typical drone, hovering can take just as much energy as flying. As long as the robot is in the air, it’s expending energy and running down its small battery capacity. 

What researchers discovered, as reported in a new study published Thursday in the journal Science, is that tiny robots could save considerable energy if they simply landed and perched between jaunts, the way a bee or butterfly might land on the ceiling before taking off again.

While the scientists toyed with a number of different surface adhesion possibilities, the team finally settled on a unique combination of electrostatic material and foam to create a new kind of built-in robot landing pad. 

A bee-inspired robot

The team built a bee-inspired micro aerial vehicle (MAV) robot and attached an electrostatic patch consisting of a carbon-fiber base, copper electrodes and a polyamide coating. It sits on a small foam cylinder. 

When charged, the electrostatic plate can attach itself to almost any surface (wood, glass, organic material) that responds to static electricity (yes, the same stuff you build up when you rub a balloon on a wall or your feet on the carpet).  

Topic:  TECHNOLOGIES 

 



SOURCE:  Paul Szoldra for Techinsider.io

The Defense Advanced Research Projects Agency has been tasked with building breakthrough technologies for the US military since 1958, and plenty were on full display at the Pentagon last week.

Tech Insider went to DARPA's "Demo Day" on May 11 where more than 60 projects were shown to reporters, senior military leaders, and government contractors. We saw everything from underwater drones that autonomously search for enemy submarines to a game-changing prosthetic hand that looks like it's straight out of "Terminator 2."

There was a ton for us to see in the Pentagon's courtyard, but these are the ones we thought were most interesting.

Here's a rundown of DARPA's "Demo Day"

DARPA Demo Day provided the DoD community with an up-close look at the Agency's diverse portfolio of innovative technologies and military systems at various stages of development and readiness, spanning every military domain from undersea to outer space and across all of DARPA's strategic focus areas, from sensors and microsystems to cyber and spectrum to biological technologies and counterterrorism.

The event was open to Pentagon badge holders, visiting U.S. Government‎ civilian/military CAC holders, and Intelligence Community badge‎ holders. 

Topic: HACKING

 

 

 

Source:  http://www.homelandsecuritynewswire.com/

National Intelligence Director James Clapper said that the campaigns of all the candidates for president are being spied on by foreign hackers with “a variety of motivations.” Clapper said that the acts of espionage against the campaigns may only just be getting started. “As the campaigns intensify we’ll probably have more of it,” Clapper noted.

National Intelligence Director James Clapper said that the campaigns of all the candidates for president are being spied on by foreign hackers with “a variety of motivations.”

Clapper revealed the hacking effort in a talk to a conference organized by the Bipartisan Policy Center, in Washington D.C.

NBC News quotes Clapper to say that the acts of espionage against the campaigns may only just be getting started. “As the campaigns intensify we’ll probably have more of it,” Clapper noted.

The hackers breaking into the candidates’ networks include foreign governments seeking early information on policy thinking, or hackers with sabotage in mind. Clapper’s office recently released information about intrusions by foreign intelligence services into the campaigns for president back in 2008.

Clapper’s office emphasized that the risk to the campaigns was real. “We’re aware that campaigns and related organizations and individuals are targeted by actors with a variety of motivations — from philosophical differences to espionage — and capabilities — from defacements to intrusions,” Clapper’s spokesman Brian Hale said in a statement.

One hacking group not hiding its intentions is the cyber-anarchist group Anonymous, which has urged its supporters to attack the Web operations of Donald Trump.

The group said it was launching a “total war” against Trump, and a masked figure appeared on YouTube and claiming to speak for Anonymous, said: “Dear Donald Trump, we have been watching you for a long time and what we see is deeply disturbing.”

The National Intelligence Agency recently said that in 2008 it helped the two nominees — Barack Obama and John McCain — track and deal with cyber-intrusions during their campaigns for president. A document describing the extent of those operations was issued by Mr Clapper’s officer earlier this month.

Eight years ago, foreign intelligence services “met with campaign contacts and staff, used human source networks for policy insights, exploited technology to get otherwise sensitive data, engaged in perception management to influence policy,” the document said. “This exceeded traditional lobbying and public diplomacy.”

 

 

 

SOURCE: Tom Spring for threatpost.com

For online casinos, business begins to peak as gamblers punch out of work and belly-up to virtual blackjack tables. But on this Tuesday in February at 5p.m., the odds were not in the house’s favor. That’s when this virtual casino—with tens of millions of dollars in virtual transaction data, thousands of user profiles and millions invested in computer infrastructure—was hit with ransomware that risked turning a thriving business into an encrypted crime scene. The criminals behind this attack couldn’t have picked a better target. This legal online casino, located outside the US, is one of the largest operators in the gambling and entertainment business. On the condition Threatpost would not identify the casino, we were given rare insight into a high-stakes ransomware attack that serves as a cautionary tale for any company.

Constant Target

“Yes, ransomware was on our radar. But in this business—where uptime is critical–daily denial-of-service and APT attacks had always been our chief concerns,” said the online casino’s chief security officer who Threatpost will identify as Robert. “To be clear, we had extensive security protocols in place and tools guarding our network,” he said. The casino, with 1,000 employees, has an infrastructure that consists of two massive physical data centers and a cloud infrastructure. As for security, the casino uses a firewall from a top-tier supplier, data center security from another leading vendor and its client AV protection was from a mix of leading providers as well. It also had contracted real-time network monitoring from an outside service provider. “It would be an understatement to say security was our top concern. It is our utmost concern,” Robert said. But nonetheless, there are no perfect security solutions. And on that Tuesday, as gamblers were logging on and servers whirled and whirred into overdrive, the casino learned the hard way nothing is bulletproof. The attack started at 5p.m. with the hook of a phishing email and a bogus invoice sent to an external consultant working in-house. Working behind the company’s firewall onsite, the consultant received an email with the subject line “Requested receipt ID:084C9F.” The consultant didn’t think anything was fishy with the email or attachment named “segreteriagenerale_request_084C9F.zip.js”. The “js” portion of the attachment’s extension was obfuscated by the attacker; it was of course a malicious JavaScript attachment. In this case, the payload was the TeslaCrypt 3 ransomware. Using the Windows 7 Sony laptop assigned to him by the casino, the consultant opened the email message and double-clicked on the attachment unleashing the ransomware. Unknown to the casino was the fact that this consultant’s Sony laptop had zero security software running on it. Making matters worse, the laptop was misconfigured with the “C:\Users\username\Public” folder wrongly set up to be shared on the company’s network. Within minutes, the ransomware attacked the notebook’s default My Folders directory and began encrypting files, Robert said. The casino consultant recalls noticing the documents he had