At DEF CON’s aviation village, the military is interested in more than just the hacks

The first-ever aviation “village” at the DEF CON security conference has an F-35 fighter jet simulator among its hacking targets, but that’s not the only reason the Defense Digital Service’s newly minted chief, Brett Goldstein, is hanging around this corner of the convention hall in Las Vegas. The agency sees it as a recruiting opportunity, too. “In this room and throughout the convention is some of the best security talent in the world,” Goldstein tells CyberScoop. “This is a win for me if I can spark the imagination of this community, get them to understand we want to collaborate with them, that the problem space is fascinating, and this is something they should think about.” Right now the DDS, which ran its first bug bounty program in 2016, has approximately 70 employees, some of which are civilians and some of which are active-duty military. But they rotate in and out approximately […]

The post At DEF CON’s aviation village, the military is interested in more than just the hacks appeared first on CyberScoop.

Continue reading At DEF CON’s aviation village, the military is interested in more than just the hacks

Cisco will pay $8.6 million to settle claims it sold US flawed surveillance software

Technology giant Cisco has agreed to pay $8.6 million to settle allegations it knowingly sold video surveillance equipment with security vulnerabilities to federal, state and local government agencies, according to court records unsealed Wednesday. A company whistleblower first informed Cisco in 2008 that a bug in its surveillance software could have enabled hackers to monitor video footage, delete footage and turn on or disable the systems. Government entities including the U.S. Secret Service, the Federal Emergency Management Agency and the New York Police Department had purchased the software, according to the Washington Post, which first reported the news. Cisco’s settlement appears to be the first whistleblower resolution of the False Claims Act, which prohibits defrauding the government, regarding cybersecurity issues. “The tech industry needs to fulfill its professional responsibility to protect the public from their products and services,” whistleblower James Glenn said in a statement. “There’s this culture that tends […]

The post Cisco will pay $8.6 million to settle claims it sold US flawed surveillance software appeared first on CyberScoop.

Continue reading Cisco will pay $8.6 million to settle claims it sold US flawed surveillance software

Privoro Announces Air Force Contract

I’m happy to share that the Air Force, through its Small Business Innovation Research (SBIR) program, has awarded Privoro a prototyping contract for our government smartphone security solutions. You can learn more by reading our press releas… Continue reading Privoro Announces Air Force Contract

Rebuilding an Extremely Rare Twin Mustang Fighter

Towards the end of the Second World War, as the United States considered their options for a possible invasion of Japan, there was demand for a new fighter that could escort long range bombers on missions which could see them travel more than 3,200 kilometers (2,000 miles) without refueling. In response, North American Aviation created the F-82, which essentially took two of their immensely successful P-51 fighters and combined them on the same wing. The resulting plane, of which only 272 were built, ultimately set the world record for longest nonstop flight of a propeller-driven fighter at 8,129 km (5,051 …read more

Continue reading Rebuilding an Extremely Rare Twin Mustang Fighter

Eyal Neemany, Javelin Networks – Paul’s Security Weekly #582

Former Head of Israeli Air Force CERT & Forensics Team, Senior Security Researcher at Javelin Networks. Eyal will be discussing securing remote administration, remote credentials, explains that Jump Servers aren’t as good, and show you have to con… Continue reading Eyal Neemany, Javelin Networks – Paul’s Security Weekly #582

Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

A new week, a new crop of security stories. Last week, U.S. Military ‘Reaper Drone’ Designs, Eavesdropping on mobile devices, Making security priority and Multifactor authentication adoption made the headlines. In addition, we discussed why that XKCD … Continue reading Security Boulevard’s 5 Most Read Stories for the Week, August 06-10

For Sale: U.S. Military ‘Reaper Drone’ Designs

A recent hack of an Air Force captain assigned to the 432nd Aircraft Maintenance Squadron at Creech Air Force Base, Nevada, and the subsequent offer for sale of the “Reaper Drone” design via the dark web for less than $200 has caught the attention of … Continue reading For Sale: U.S. Military ‘Reaper Drone’ Designs

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info

The thief also had a second dataset, including the M1 Abrams maintenance manual, a tank platoon training course, a crew survival course and documentation on improvised explosive device (IED) mitigation tactics. Continue reading Hacker Compromises Air Force Captain to Steal Sensitive Drone Info