Posts Tagged technology

Creating and Managing Passwords: How the Experts Do It

From Ars Technica:

I recently checked in with five security experts to learn about their approach to choosing and storing crack-resistant passwords. They include renowned cryptographer Bruce Schneier, who is a “security futurologist” at BT and recently joined the Electronic Frontier Foundation’s board of directors; Adriel T. Desautels, CEO of Netragard, a firm that gets paid to hack large companies and then tell them how it was done; Jeremiah Grossman, founder and CTO of WhiteHat Security; Jeffrey Goldberg, “defender against the dark arts” at AgileBits, a company that develops the popular 1Password password manager; and Jeremi Gosney, a password security expert at Stricture Consulting.

, , , ,

No Comments

New Software Designed to Prevent 3D Printing of Firearms

From ArsTechnica:

On Tuesday, Create it Real announced that in the coming months its software would include an option to find and block gun parts. When it detects a file that contains firearm parts, the software will shut down and disallow printing. Create it Real’s software will likely be licensed to 3D printer manufacturers for around “several thousand euros annually” and then bundled with a 3D printer sold to individual consumers.

, , , , , ,

No Comments

New Night Vision With Heads Up Display

ITT Exelis has developed a new night vision goggle. From KitUp:

“You can have a heads up display inside the goggle which can be maps, images or GPS coordinates. You can configure it for text messages. This is a multi-faceted device. It allows us to take night vision technology and connect it to a tactical network…”

, , , ,

No Comments

Tracking Point Rifle System

It seems that this has the potential to be more dangerous than single shot plastic guns. With this system it looks like someone with no shooting experience could pick up this rifle and be extremely deadly. That said, in a free society plastic guns and point-and-shoot rifles should not be a concern to anyone. The pros outweigh the cons.

, , , , , ,

No Comments

Dept. of State Takes Down DEFCAD Gun Files

The Blaze reports that the Department of State has claimed ownership of the information which Defense Distributed had on its website.

A letter to Defense Distributed from the Department of State, Bureau of Political Military Affairs, Office of Defense Trade Controls Compliance, Enforcement Division (DTCC/END) explains that while conducting a review of the data posted on DEFCAD it found that the licensed firearm manufacturer might have released ITAR (International Traffic in Arms Regulations)-controlled information without authorization and would thus be in violation.

, , , , , , , , , , , , , , , , ,

No Comments

GPS Workaround From DARPA

From Wired.com:

When the satellites we rely on for navigation can’t be reached — whether they’ve been jammed or you’re in a densely packed city — the chip contains everything you’ll need to figure out how to get from place to place. It’s got gyroscopes, accelerometers and a master clock, to calculate orientation, acceleration and time. The TIMU is fabricated from silicon dioxide and contained within a 10 cubic millimeter package — meaning it can just about fit within the Lincoln Memorial rendered on the back of a penny.

, ,

No Comments

Interview with Cody Wilson of Defense Distributed

, , , , , , , , , , , ,

No Comments

Technology vs Security

From Wired:

Because the damage attackers can cause becomes greater as technology becomes more powerful. Guns become more harmful, explosions become bigger, malware becomes more pernicious … and so on. A single attacker, or small group of attackers, can cause more destruction than ever before.

As the destructive power of individual actors and fringe groups increases, so do the calls for — and society’s acceptance of — increased security.

, , , , , ,

No Comments

Groupon Cancels Conceled Carry Deals

A local Austin business man offered a Groupon deal for a concealed carry class and after it became popular the coupon site canceled all gun related deals.

, , , , , , , ,

No Comments

3D Printed Magazines

You can’t stop innovation:

, , , ,

No Comments

Steganography

Article from SOFREP about how terrorist organizations are hiding and transmitting information:

In the digital world the most common form of steganography is embedding information in media files. Media files are rather large, so a little data padding isn’t as noticeable. They are also created with layers of information, which allows the embedding of other data into a layer, and keeps it obscured behind preceding layers – kind of like slipping a tiny, extra piece of cheese into a dagwood sandwich.

, , , , ,

No Comments

Israel Cyber Security Summit

From Defense Update:

Since the creation of cyberspace and the internet Israeli security experts and scientists have positioned the country at the forefront of cyber defense, developing everything from the basic building blocks of network security, data encryption and information protection to integrated system providing monitoring, simulation and rapid response in the event of cyber attacks. The Israeli government has recently established a national cyber center, with the goals to coordinate the research, development, legislation and preparedness among the academy, private and public sector, to enhance the protection and minimize vulnerability of the country’s commercial, industrial and public sector to hacking, cyber crime and cyber attacks.

, , , ,

No Comments

FBI Science and Technology Branch Website

Science and Technology

With about 4,500 highly trained professionals in a wide range of disciplines, the Science and Technology Branch supports the FBI mission—along with the U.S. intelligence and law enforcement communities—by creating, adapting, and deploying state-of-the-art tools and techniques to collect, analyze, and share information and evidence.

, ,

No Comments

New Tire Technology in Development

, , , , , , ,

No Comments

Mozilla’s New Universal Login

Mozilla has developed a competing login framework that they claim is more secure than Facebook’s or Google’s design.

, , , , ,

No Comments