The Macgyver bot is designed to go into a disaster are and use whatever is lying around as tools to get the job done. Developed by researchers at Georgia Tech, the Macgyver bot will be preprogrammed with algorithms and logic sequences which will allow it to assess a situation, and the environment it occurs in,…
Category: Technology
Department of Homeland Security to form “CyberReserve” volunteer cybersecurity army made of civilian hackers?
According to sources, the Department of Homeland Security was advised last week, to create a “cyber skills task force” that would act as a reserve army of cyber specialists in order to mold top-notch cybersecurity talent to address U.S. cybersecurity emergencies. Called the “CyberReserve” and similar to the National Guard program, CyberReserve would ensure professional…
Akamai’s Real-time web monitor uses 105,000 servers to identify regions with greatest attack traffic
Akamai, who operate one of the world’s largest distributed-computing platforms, monitors global Internet conditions around the clock. With this real-time data they identify the global regions with the greatest attack traffic, cities with the slowest Web connections (latency), and geographic areas with the most Web traffic (traffic density). It does this with a network of…
Defense Secretary Panetta warns of dire threat of cyberattack on U.S.–equivalent of “cyber Pearl Harbor”
United States Defense Secretary Leon Panetta painted a dire picture of cyberattack on the United States yesterday saying “an aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches. They could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals.”
Universal orders takedown of dancing baby video because one of their songs was playing in the background
EFF has a big case this week in San Jose, California. The problem began in 2007 when Stephanie Lenz posted a video on YouTube. In the 29-second clip, Lenz’s young son is dancing in the kitchen to the tune of “Let’s Go Crazy” which is playing on a stereo in the background. Universal Music Publishing…
10 minute video explains how Tor works behind the scenes to provide anonymity
Compute Cycle brings us a “deep dive” into Tor and how it works to provide anonymity in a new 10-minute video (see below). In addition, EFF (Electronic Frontier Foundation) has a neat interactive graphic on their website that lets you visualize what data is visible to eavesdroppers when Tor and/or https is involved. Dive in…
China’s Lenovo passes HP to become the world’s #1 PC maker
HRP-4C Miim female robot walks like a human being – similar to ASIMO but prettier
Advanced Industrial Science Technology (AIST) has created HRP-4C Miim, a female robot that walks like a human being (similar to ASIMO but prettier). Her knees are stretched by up/down motion of the waist, the single-toe supporting realizes longer strides, and she mimics the swing motion of human legs.
Botnet discovered that scanned the entire IPv4 address space in less than two weeks
Researchers at the University of California San Diego have monitored a botnet that they believe scanned the entire IPv4 address space, possibly in less than two weeks. Using a network block called the UCSD Network Telescope, also known as the UCSD darknet, researchers noticed the illicit activity in February 2011.
Halal – Iran’s parallel and private walled-off Internet may already be online and in use
For many years, Iran has proposed a parallel, but private, Internet for its citizens. This private Internet is referred to as “halal”. Halal would provide Iranians a secure, and controlled Internet experience, one that promotes good Islamic moral values, while restricting access to the outside world. Collin Anderson, independent security analyst, has found evidence that…








