Topic: hacking

NASA robot lands at CSAIL, FBI keeps iPhone hack a secret, Apple open-sources CareKit—SD Times news digest: April 28, 2016

The 300-pound humanoid robot that NASA wants to use for space exploration has arrived at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) this week. Researchers at CSAIL, led by CSAIL principal investigator Russ Tedrake will program their new “Valkyrie” robot to autonomously perform challenging tasks that would allow it to replace or help astronauts … continue reading

Intel releases Arduino 101 source code, free VPN integrated in Opera, and VersionOne Spring 2016 Release—SD Times news digest: April 21, 2016

The real-time operating system that powers the Arduino 101 and Genuino 101 is open source, ready for those who want to use it for studying purposes. This package contains the complete BSP (Board Support Package) for the Curie processor on the 101. It allows developers to compile and modify the core OS and the firmware … continue reading

Apple is developing new iPhone security to thwart the FBI

Recent reports show Google and other technology companies are standing with Apple in the FBI/Apple conflict, while others like Bill Gates sided with the FBI. Meanwhile, Apple’s engineers have begun developing new security measures that would make it impossible for the government to break into a locked iPhone, even if they do win the fight. … continue reading

SD Times Blog: Batten down the patches

It’s that time of year again: Black Hat and Defcon are upon us! That means your systems are all in danger, and your applications should be afraid. Not only will there be (and has already been) an endless stream of new exploits dropped at the shows, but the weekend of Defcon is, effectively, open season … continue reading

SD Times Blog: When good software developers go bad

By now you’ve probably heard of Ross Ulbricht and Silk Road. When he was apprehended last year in San Francisco and charged with running the world’s largest online drug and illegal goods marketplace, he was at a local library using the wireless network to log in to his black market business. Ulbricht is still claiming … continue reading

Zeichick’s Take: Innovate in the cloud, cheaply and securely

For development teams, cloud computing is enthralling. Where’s the best place for distributed developers, telecommuters and contractors to reach the code repository? In the cloud. Where do you want the high-performance build servers? At a cloud host, where you can commandeer CPU resources as needed. Storing artifacts? Use cheap cloud storage. Hosting test harness? The … continue reading

Inkblot password system addresses growing security breach problem

Carnegie Mellon computer scientists create GOTCHA, a password defense mechanism similar to CAPTCHAs … continue reading

SD Times Blog: Idaho court confiscates software developer’s computer because he ‘likes hacking’

Can one word justify seizing a developer’s property? A huge legal fight will ensue over it … continue reading

Zeichick’s Take: With software security, we’re outgunned

Hackers are one step ahead of security efforts, and are better organized than the businesses they target … continue reading

DMCA.com Protection Status