LAS VEGAS --The growing number of vendors supporting 2.5 and 5 Gigabit Ethernet over twisted pair copper cabling demonstrated the interoperability of a variety of new gear at the Interop event here.The NBase-T Alliance showed off an assortment of 2.5 and 5GBase-T products – from switches to NICs -- it says show new applications for NBase-T products, including the ability to aggregate data at 2.5G and 5G Ethernet data across 802.11ac Wave2 access points and improved speed links to network-attached storage devices. The Alliance noted that Dell’Oro Group predicted recently that there will be a doubling of ports shipped every year in the 2.5G and 5G Ethernet market over the next 3 years.To read this article in full or to leave a comment, please click here
NASA said that for the first time it has demonstrated that a wireless system can communicate – sending route options and weather information for example -- with a jet on the ground.NASA said it tested a demonstration system known as Aircraft Access to System Wide Information Management (SWIM), to wirelessly send aviation information to an FAA Bombardier Global 5000 test aircraft taxiing 60 to 70 miles per hour on the Cleveland Hopkins International Airport runway. They sent the information over a prototype wireless system called Aeronautical Mobile Airport Communications System, or AeroMACS, developed by Hitachi.To read this article in full or to leave a comment, please click here
NASA said that for the first time it has demonstrated that a wireless system can communicate – sending route options and weather information for example -- with a jet on the ground.NASA said it tested a demonstration system known as Aircraft Access to System Wide Information Management (SWIM), to wirelessly send aviation information to an FAA Bombardier Global 5000 test aircraft taxiing 60 to 70 miles per hour on the Cleveland Hopkins International Airport runway. They sent the information over a prototype wireless system called Aeronautical Mobile Airport Communications System, or AeroMACS, developed by Hitachi.To read this article in full or to leave a comment, please click here
Identity theft is a raging problem but at least some scammers are getting their comeuppance.The Department of Justice today touted that one scammer got four years in prison for his part in a $4.4 million fraudulent federal income tax return scheme that, according to court documents involved the filing of at least 12,000 fraudulent federal income tax returns that sought refunds of at least $42 million from the U.S. Treasury. +More on Network World: IRS: Top 10 2015 identity theft busts+To read this article in full or to leave a comment, please click here
Identity theft is a raging problem but at least some scammers are getting their comeuppance.The Department of Justice today touted that one scammer got four years in prison for his part in a $4.4 million fraudulent federal income tax return scheme that, according to court documents involved the filing of at least 12,000 fraudulent federal income tax returns that sought refunds of at least $42 million from the U.S. Treasury. +More on Network World: IRS: Top 10 2015 identity theft busts+To read this article in full or to leave a comment, please click here
The scourge of ransomware hit new highs in 2015 and 2016 is turning out to be no bargain – particularly attacks against businesses as the payoffs are higher, the FBI said this week.Ransomware attacks are not only proliferating, they’re becoming more sophisticated, the FBI stated.+More on Network World: FBI warning puts car hacking on bigger radar screen+“Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals,” the FBI stated. And in newly identified instances of ransomware, some cyber criminals aren’t using e-mails at all. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers,” said FBI Cyber Division Assistant Director James Trainor in a statement.To read this article in full or to leave a comment, please click here
The scourge of ransomware hit new highs in 2015 and 2016 is turning out to be no bargain – particularly attacks against businesses as the payoffs are higher, the FBI said this week.
Ransomware attacks are not only proliferating, they’re becoming more sophisticated, the FBI stated.
+More on Network World: FBI warning puts car hacking on bigger radar screen+
“Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals,” the FBI stated. And in newly identified instances of ransomware, some cyber criminals aren’t using e-mails at all. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers,” said FBI Cyber Division Assistant Director James Trainor in a statement.To read this article in full or to leave a comment, please click here
The CIA unearths some pretty interesting materials and this week it was touting the oldest once-classified documents in is collection.
The mostly cryptic documents, from 1917 and 1918 describe secret writing techniques are believed to be the only remaining classified documents from the World War I era. Any documents describing secret writing fall under the CIA’s purview to declassify, the agency noted.
+More on Network World: The hot art in the CIA’s cool art collection+
The CIA website noted that one file outlines the chemicals and techniques necessary for developing certain types of secret writing ink and a method for opening sealed letters without detection. Another communication dated June 14, 1918 – written in French – discloses the formula the German’s used to produce invisible ink.To read this article in full or to leave a comment, please click here
The CIA unearths some pretty interesting materials and this week it was touting the oldest once-classified documents in is collection.
The mostly cryptic documents, from 1917 and 1918 describe secret writing techniques are believed to be the only remaining classified documents from the World War I era. Any documents describing secret writing fall under the CIA’s purview to declassify, the agency noted.
+More on Network World: The hot art in the CIA’s cool art collection+
The CIA website noted that one file outlines the chemicals and techniques necessary for developing certain types of secret writing ink and a method for opening sealed letters without detection. Another communication dated June 14, 1918 – written in French – discloses the formula the German’s used to produce invisible ink.To read this article in full or to leave a comment, please click here
The concerns around the cybersecurity of your car are likely magnify in the near term while experts try to figure out what can be done simply to eliminate risks.But while some short-term fixes may develop, forthcoming government auto cybersecurity standards won’t happen until at least 2018. Furthermore, technologies, such as message encryption and authentication, which can be used to secure and verify the legitimacy of communications occurring along in-vehicle networks—cannot be incorporated into existing vehicles. Rather, such technologies must be incorporated during the vehicle design and production process, which according to experts, will take approximately 5 years to complete, according to a report out this week by the Government Accountability Office.To read this article in full or to leave a comment, please click here
The concerns around the cybersecurity of your car are likely magnify in the near term while experts try to figure out what can be done simply to eliminate risks.But while some short-term fixes may develop, forthcoming government auto cybersecurity standards won’t happen until at least 2018. Furthermore, technologies, such as message encryption and authentication, which can be used to secure and verify the legitimacy of communications occurring along in-vehicle networks—cannot be incorporated into existing vehicles. Rather, such technologies must be incorporated during the vehicle design and production process, which according to experts, will take approximately 5 years to complete, according to a report out this week by the Government Accountability Office.To read this article in full or to leave a comment, please click here
The United States isn’t as deeply unprepared for electromagnetic threats – either from space or man-made -- as it was a few years ago but a lot of work remains and awareness of the danger needs to be amped-up if the country wants to truly protect the electric grid.That was the general conclusion from a report by the watchdogs at the Government Accountability Office this that looked at federal efforts to address electromagnetic risks to the electric grid.+More on Network World: Threat or menace?: Gaging electromagnetic risks to the electric grid+To read this article in full or to leave a comment, please click here
The United States isn’t as deeply unprepared for electromagnetic threats – either from space or man-made -- as it was a few years ago but a lot of work remains and awareness of the danger needs to be amped-up if the country wants to truly protect the electric grid.That was the general conclusion from a report by the watchdogs at the Government Accountability Office this that looked at federal efforts to address electromagnetic risks to the electric grid.+More on Network World: Threat or menace?: Gaging electromagnetic risks to the electric grid+To read this article in full or to leave a comment, please click here
The United States isn’t as deeply unprepared for electromagnetic threats – either from space or man-made -- as it was a few years ago but a lot of work remains and awareness of the danger needs to be amped-up if the country wants to truly protect the electric grid.That was the general conclusion from a report by the watchdogs at the Government Accountability Office this that looked at federal efforts to address electromagnetic risks to the electric grid.+More on Network World: Threat or menace?: Gaging electromagnetic risks to the electric grid+To read this article in full or to leave a comment, please click here
It might have been a pretty nice life for Thomas Hauk -- for a while anyway -- but frauds usually explode and this one was nothing different.The US Marshals this week announced the auction of the Hauk’s spoils -- 25 vehicles, including Ferrari, Mclaren, BW and Porche cars worth more than $1.5 million.+More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here
It might have been a pretty nice life for Thomas Hauk -- for a while anyway -- but frauds usually explode and this one was nothing different.The US Marshals this week announced the auction of the Hauk’s spoils -- 25 vehicles, including Ferrari, Mclaren, BW and Porche cars worth more than $1.5 million.+More on Network World: 26 of the craziest and scariest things the TSA has found on travelers+To read this article in full or to leave a comment, please click here
NASA this week said it was calling for public input on living quarters for astronauts to live in deep space as well as systems and technologies for a new Mars Orbiter.As far as the living spaces go, Congress earlier this year urged the space agency to move along its ideas for how humans would live on planets or other places far from Earth. With that pressure as a backdrop NASA said it wants US companies, universities, and non-profit organizations to offer up their best ideas for space living systems would include reliable life support systems, fire safety, atmosphere revitalization and monitoring, water processing, lighting, and fire detection and radiation protection.To read this article in full or to leave a comment, please click here
NASA this week said it was calling for public input on living quarters for astronauts to live in deep space as well as systems and technologies for a new Mars Orbiter.As far as the living spaces go, Congress earlier this year urged the space agency to move along its ideas for how humans would live on planets or other places far from Earth. With that pressure as a backdrop NASA said it wants US companies, universities, and non-profit organizations to offer up their best ideas for space living systems would include reliable life support systems, fire safety, atmosphere revitalization and monitoring, water processing, lighting, and fire detection and radiation protection.To read this article in full or to leave a comment, please click here
NASA this week took a giant step toward using solar electric power for future space missions by awarding a $67 million to Aerojet Rocketdyne to develop an advanced electric propulsion system.Such a system would deploy large solar arrays that can be used to convert sunlight into electrical power that ionizes atoms of xenon which is the propellant for the spacecraft’s thrusters. The thrust of such a power plant isn’t huge but its ability to provide increasing, continuous power over a long period of time is what makes it so attractive for long-duration spaceflights.+More on Network World: NASA: Top 10 space junk missions+To read this article in full or to leave a comment, please click here
NASA this week took a giant step toward using solar electric power for future space missions by awarding a $67 million to Aerojet Rocketdyne to develop an advanced electric propulsion system.Such a system would deploy large solar arrays that can be used to convert sunlight into electrical power that ionizes atoms of xenon which is the propellant for the spacecraft’s thrusters. The thrust of such a power plant isn’t huge but its ability to provide increasing, continuous power over a long period of time is what makes it so attractive for long-duration spaceflights.+More on Network World: NASA: Top 10 space junk missions+To read this article in full or to leave a comment, please click here