Michael Cooney

Author Archives: Michael Cooney

Pressure grows to eradicate vile tech support scam

Despite aggressive law enforcement and Federal Trade Commission actions to battle it, the scourge known as the “Tech Support Scam” is growing – with older individuals a rising target.The tech support scam basically involves tricking people into believing their computer has problems, and then charging them hundreds of dollars for unnecessary, worthless, and in some cases destructive applications such as malware, spyware, adware, keystroke loggers, and other harmful applications.+More on Network World: What’s hot in driverless cars?+To read this article in full or to leave a comment, please click here

Image too good to be true? DARPA program targets image doctoring

It isn’t hard for just about anyone to change or alter an image these days -- and that can be a problem.It’s an issue researchers at the Defense Advanced Research Projects Agency want top put to rest with a new program called Media Forensics or MediFor, which looks to build an algorithmic-based platform that can detect image manipulation.+More on Network World: Gartner: Get onboard the algorithm train!“The forensic tools used today lack robustness and scalability and address only some aspects of media authentication; an end‐to‐end platform to perform a complete and automated forensic analysis does not exist. Although there are a few applications for image manipulation detection in the commercial sector, they are typically limited to a yes/no decision about the source being an “original” asset, obtained directly from an imaging device. As a result, media authentication is typically performed manually using a variety of ad hoc methods that are often more art than science, and forensics analysts rely heavily on their own background and experience,” DARPA stated.To read this article in full or to leave a comment, please click here

What’s hot in driverless cars?

Who's drivingImage by REUTERS/Edgar SuThe development of self-driving and autonomous cars seems to be all the rage in the automotive community these days. Certainly lots of work remains to be done around safety and communications technologies but there is a heavy push to make car drones a reality. Here we take a look at some of the most recent developments.To read this article in full or to leave a comment, please click here

IRS, tax industry players detail identity theft, fraud combat plans

As tax identity theft and fraud continue to spiral upwards, the IRS and key industry players are trying to develop new technolgies and techniques to slow the swindle juggernaught down.The IRS this week updated the community about what work has been done by its collarborative group of chief executive officers and private sector firms such as H&R Block and Intuit since March when it formed the group to bolster protections against identity theft refund fraud for the 2016 tax season.To read this article in full or to leave a comment, please click here

Six key challenges loom over car communication technology

As car-makers build more tech-savvy autos, their ability to communicate and interact with smart infrastructure to prevent accidents or warn of impending road hazards faces number of challenges that may hinder its deployment.+More on Network World: Car crash prevention technologies face huge challenges+Watchdogs at the Government Accountability Office this week said while the Department of Transportation will over the next five years spend $100 million via its Connected Vehicle pilot program that deploys Vehicle-to-infrastructure (V2I) technologies in real-world settings – many challenges with the technologies remain.To read this article in full or to leave a comment, please click here

Six key challenges loom over car communication technology

As car-makers build more tech-savvy autos, their ability to communicate and interact with smart infrastructure to prevent accidents or warn of impending road hazards faces number of challenges that may hinder its deployment.+More on Network World: Car crash prevention technologies face huge challenges+Watchdogs at the Government Accountability Office this week said while the Department of Transportation will over the next five years spend $100 million via its Connected Vehicle pilot program that deploys Vehicle-to-infrastructure (V2I) technologies in real-world settings – many challenges with the technologies remain.To read this article in full or to leave a comment, please click here

Can myriad wireless networks connect as one fast, secure system?

Getting the innumerable wireless networks the military and some commercial enterprises to communicate just doesn’t work in many cases, creating serious communications and security problems for warfighters and others interacting with those networks.+More on Network World Gartner: IT should simplify security to fight inescapable hackers+Researchers at the Defense Advanced Research Projects Agency are looking for ways to change that problem with a new program called Dynamic Network Adaptation for Mission Optimization (DyNAMO).To read this article in full or to leave a comment, please click here

Can myriad wireless networks connect as one fast, secure system?

Getting the innumerable wireless networks the military and some commercial enterprises to communicate just doesn’t work in many cases, creating serious communications and security problems for warfighters and others interacting with those networks.+More on Network World Gartner: IT should simplify security to fight inescapable hackers+Researchers at the Defense Advanced Research Projects Agency are looking for ways to change that problem with a new program called Dynamic Network Adaptation for Mission Optimization (DyNAMO).To read this article in full or to leave a comment, please click here

FBI, DoJ take out $10 Million “Bugat” banking botnet

The FBI and US Department of Justice today said they disrupted the activities and arrested the administrator of the botnet known as “Bugat,”  “Cridex” or “Dridex,” which authorities said pilfered over $10 million.More on Network World: Gartner: Risk, relentless data center demand, open source and other tech trends IT needs to knowThe FBI called Bugat a sophisticated malware package designed to steal banking and other credentials from infected computers and is generally distributed through phishing. The software typically can upload files from an infected computer and download executable files to the victim’s system. Collected information id sent to the criminal’s system. Bugat is specifically designed to defeat antivirus and other protective measures employed by victims.To read this article in full or to leave a comment, please click here

DARPA wants vanishing drones

It’s a description right out of a James Bond or Mission: Impossible script: Create a flock of unmanned aircraft that can be dropped from a larger mothership to take on a mission, then actually vanish once the mission is carried out. +More on Network World: World’s craziest Halloween coffins+ Engineers at the Defense Advanced Research Projects Agency envision the disappearing drones as ideal for a number of missions, including the delivery of humanitarian or military aid to people or military personnel in rough terrain or hard-to reach-places.To read this article in full or to leave a comment, please click here

Gartner: Risk, relentless data center demand, open source and other tech trends IT needs to know

ORLANDO --It’s not a surprise to most in IT that the info/tech world is fraught with risk, change, and disruption but most of the time all of those issues aren’t laid out in front of them in nice, neat fashion like they are at Gartner Symposium/ITxpo.There are a number of key themes echoing around the Symposium this week many having to do the smart algorithms and how that kind of technology is going to change the world forever. Another is the move to an all-digital world – a trend well underway and mostly understood by most large companies.+More on Network World: Gartner: Top 10 strategic predictions that could shake up IT+To read this article in full or to leave a comment, please click here

Gartner: Risk, relentless data center demand, open source and other tech trends IT needs to know

ORLANDO --It’s not a surprise to most in IT that the info/tech world is fraught with risk, change, and disruption but most of the time all of those issues aren’t laid out in front of them in nice, neat fashion like they are at Gartner Symposium/ITxpo.There are a number of key themes echoing around the Symposium this week many having to do the smart algorithms and how that kind of technology is going to change the world forever. Another is the move to an all-digital world – a trend well underway and mostly understood by most large companies.+More on Network World: Gartner: Top 10 strategic predictions that could shake up IT+To read this article in full or to leave a comment, please click here

Gartner: Top 10 strategic predictions that could shake up IT

ORLANDO-- The robots decidedly have it. They will help run businesses, make decisions for you and maybe even be your boss. Those were just some of the predictions put forth by Gartner vice president Daryl Plummer at the consultancy’s always interesting prediction of future IT technology directions. +More on Network World: Gartner: IT should simplify security to fight inescapable hackers+ “Robots are beginning to rise – don’t think Terminator robots – but smart robots that will have the ability to learn things better, faster,” PlummerTo read this article in full or to leave a comment, please click here

Gartner: IT should simplify security to fight inescapable hackers

ORLANDO -- On some level it may seem incongruous to many IT organizations but as security challenges mount, enterprises should take a look at their protection systems and look to simplify them -- not make the more complicated -- to battle hackers.+More on Network World: Gartner: Get onboard the algorithm train!+The Risk and Security officer in many enterprises today is mostly concerned with old technology risks. They’ve become obsessed with external hacks, chasing the impossible goal of perfect protection. However, 65% of CEOs say their risk management approach is falling behind, said Peter Sondergaard senior vice president of research withGartner at the consultancy’s Symposium/IT Expo this week.To read this article in full or to leave a comment, please click here

Gartner: Get onboard the algorithm train!

ORLANDO -- Algorithms are hot and will be a major driver in the future of IT and business. That was the driving thought from the opening keynote session at this week’s Gartner Symposium/IT Expo.In five years 1 million new devices will come online every hour and these devices will create billions of new relationships. These relationships are not driven solely by data but algorithms, said Peter Sondergaard senior vice president of research withGartner.+More on Network World: Gartner: Top 10 Technology Trends for 2015 IT can’t ignore+To read this article in full or to leave a comment, please click here

NASA targets Venus, asteroids with potential missions

NASA this week picked five possible contenders for a relatively low-cost robotic mission to space.The five candidates from a batch of 27 –include Venus, near-Earth object and asteroid operations – will ultimately be whittled down to one or two that will cost approximately $500 million, not including launch vehicle or post-launch operations, NASA stated.+More on Network World: 13 awesome and scary things in near Earth space+Each investigation team will receive $3 million to conduct concept design studies and analyses for NASA’s Discovery Program. After a detailed review and evaluation of each experiment, NASA will make the final selections by September 2016 for continued development leading up to launch possibly by 2020, NASA stated.To read this article in full or to leave a comment, please click here

Network security weaknesses plague federal agencies

In the shadow of the recent Office of Personnel Management break-in it likely comes as little surprise to many that the federal government needs to pick up its security game in a big way.This challenge is perhaps reflected best in report this week by watchdogs at the Government Accountability Office that shows despite years of recommendations and billions of dollars spent, most federal agencies remain frighteningly weak when it comes to cybersecurity.To read this article in full or to leave a comment, please click here

What will be hottest space research in next ten years?

With NASA spotting water flows on Mars this week, excitement abounds as to what might be the next big thing for astrobiologsts and space scientists in general.Interestingly a congressional hearing entitled “Astrobiology and the Search for Life Beyond Earth in the Next Decade” was on tap this week to take a look at what some key issues are as NASA and other space organization look toward the future.+More on Network World: NASA touts real technologies highlighted in imminent 'The Martian' flick+To read this article in full or to leave a comment, please click here

NASA spots briny water flows on Mars

NASA said today that liquid water flows intermittently on Mars– a significant finding in the decades-long search for life and for possible human use on future trips to the red planet.The water flow evidence was spotted by researchers from Georgia Tech employing NASA’s Mars Reconnaissance Orbiter (MRO) – a 4,800lb spacecraft that has been taking pictures and measurements of Mars since 2006. In this case, using an imaging spectrometer researchers detected signatures of hydrated minerals on slopes where mysterious dark streaks are seen on the red planet in dozens of locations.+More on Network World: NASA touts real technologies highlighted in imminent 'The Martian' flick+To read this article in full or to leave a comment, please click here

Researchers tout technology to make electronics out of old tires

Researchers are working with a process that turns old tires – and there are some 300,000 tossed yearly – into electrodes for supercapacitors that would be used on the grid or in cars and other electronics applications.+More on Network World: Real Jobs for Real Robots+ The technology developed at the Department of Energy’s Oak Ridge National Laboratory and Drexel University produces carbon composite papers through a process described like this: “the researchers soaked crumbs of irregularly shaped tire rubber in concentrated sulfuric acid. They then washed the rubber and put it into a tubular furnace under a flowing nitrogen gas atmosphere. They gradually increased the temperature from 400 degrees Celsius to 1,100 degrees. After several additional steps, including mixing the material with potassium hydroxide and additional baking and washing with deionized water and oven drying, researchers have a material they could mix with polyaniline, an electrically conductive polymer, until they have a finished product.”To read this article in full or to leave a comment, please click here

1 45 46 47 48 49 52