Networks Communications


Army's MORPHINATOR: A shape-shifting approach to network defense

The cyber maneuver technology would randomize configurations and other aspects of a network to fool and foil intruders.

Securing the grid is crucial, but Chicken Little claims don’t help

Senators' claims that critical infrastructure is vulnerable to a "few keystrokes" belie its resilience and obscure the real threats.

Cloud mapping tools to aid first responders during disasters

Esri's GIS public information maps will be made accessible on Microsoft's cloud-based disaster portal.

Army's 'Kraken' puts data from many sensors onto one screen

With troop drawdowns in Afghanistan, the Army will use computerized surveillance technology to improve perimeter security and help protect small units in remote outposts.

AC/DC 'Thunderstruck' worm and the rise of infrastructure attacks

The NSA's chief says attacks on U.S. critical infrastructure increased 17-fold in two years, while Iran's nuclear program continues to be a target.

'Hit man' phishing scam makes an offer you can refuse

Phishing is the most common attack used against federal networks, so it's important to be aware of the latest techniques, even if they seem unlikely.

New ‘Universal Gateway’ speeds data to Navy vessels

Office of Naval Research’s “network bridging system” moves data instantaneously between the combat system and the command and control network.

New tool spots hacking vulnerabilities in smart meters

Smart meters have an optical port that, if attacked, can let someone change the way they operate, a researcher says at Black Hat.

Black Hat: If it ain't broke, it's just a matter of time

This year's Black Hat Briefings will tackle OS security — or lack of it — in Windows and iOS. Mobile devices and industrial control systems get a lot of attention, too.

Smooth data-center move sets template for disaster recovery

Alaska’s Enterprise Technology Services team used a unified computing system to quickly move existing services to a new data center, and validated its disaster recovery approach and failover capabilities in the process.

NOAA tracks toxic Great Lakes algae from space

A public/private pilot program is taking a close-up look at harmful algae in Lake Erie by processing data retrieved from space.

A look inside the future of 911 services

Alabama’s Next Generation program plans to move all 911 traffic to an IP network over the next 18 months, paving the way for text, video and photos with emergency calls.

Unified comm is the next step in 911's evolution

The FCC and Transportation Department are working to establish a transition path to the next generation of 911 services.

Mixing supercomputing, social networking for a better view of Earth

The NASA Earth Exchange lets scientists build in hours Landsat-based Earth models that used to take months.

Cyber bill accents threat-info sharing, government IT monitoring

Sen. Lieberman introduces cybersecurity bill that offers limited liability for sharing threat information and emphasizes continuous monitoring of government IT systems.