More at: http://www.esa.int/Highlights/Week_In_Images_10_14_August_2015
Fungus: The Plastic of the Future via Motherboard
In this episode of Upgrade, Motherboard dives head first into the R+D world surrounding the development of fungi as a viable replacement for plastic, and the people who hope it can lead to a better and more sustainable future.
Aggressive defence needed against cyber threats, expert says
Canada must aggressively deploy its spies and other intelligence capabilities against accelerating cyber threats to the country’s vital digi
Snowden downloaded NSA secrets while working for Dell, sources say
WASHINGTON (Reuters) - Former intelligence contractor Edward Snowden began downloading documents describing the U.S. government's electronic
BattleHawk wants to be your own personal kamikaze robot
Textron is shopping around the "loitering" guided flying hand grenade.
Attackers wield Firefox exploit to uncloak anonymous Tor users
Publicly available exploit threatens all Tor users unless they take action now.
‘Predator’ on the prowl: Multi-billion DARPA rival set up in Russia
The FPI's budget has not been finalized, but media speculation has predicted that it could be given more than $100 billion between now and 2
N.S.A. Enforces Zero-Tolerance Policy on Conscience
The National Security Agency moved swiftly and forcefully today to remind its employees of its longstanding zero-tolerance policy on conscie
Obama orders US to draw up overseas target list for cyber-attacks
Exclusive: Top-secret directive steps up offensive cyber capabilities to 'advance US objectives around the world'
China Is Winning the Cyber War Because They Hacked U.S. Plans for Real War
Ballistic-missile defenses, joint-strike fighters, Black Hawks, and more — Chinese hackers have their hands on plans for these and more of t
This Pentagon Project Makes Cyberwar as Easy as Angry Birds | Danger Roo...
All it takes is a finger swipe and a few taps of the touchscreen, and the cyber attack is ready to launch.
Cyber Security Education in a Time of Change | USENIX
The call is out and it is vast. Across the board, personnel are being sought for the cyber security workforce. Academe is faced with the tre
Pentagon cites new drive to develop anti-satellite weapons
WASHINGTON (Reuters) - Deputy Defense Secretary Ashton Carter on Tuesday said the U.S. military had launched a long overdue effort to safegu
Edgar Allan Poe and cryptography: Are there hidden messages in ‘Eureka’?
Edgar Allan Poe had a fascination for cryptography. And he was certainly not the only one, because in his time cryptography played an import
Revision To NIST Security Controls Catalog Addresses Steganography Threa...
Steganography is an information hiding technique dating back to the days of Ancient Greece
Iran’s Basij Force Says It Has Come Under Cyberattack
The Basij force of Iran's Revolutionary Guard has said in a statement posted by Iranian news outlets that several of its websites have come