DARPA

seL4, Hack-proof DARPA-derived micro kernel goes open source tomorrowseL4, Hack-proof DARPA-derived micro kernel goes open source tomorrow

seL4, Hack-proof DARPA-derived micro kernel goes open source tomorrow

DARPA-derived secure micro kernel seL4 goes open source tomorrow, it is the a first prototype mathematically proven and hacker-repelling software.…

11 years ago
Darpa is looking for experts from private sector for future cyber opsDarpa is looking for experts from private sector for future cyber ops

Darpa is looking for experts from private sector for future cyber ops

Darpa is scouting the private companies to recruit high skilled professional and use company infrastructure to protect classified information. The…

11 years ago
Crowd Sourced Formal Verification, find software bugs is a gameCrowd Sourced Formal Verification, find software bugs is a game

Crowd Sourced Formal Verification, find software bugs is a game

DARPA has launched the Crowd Sourced Formal Verification, it creates a set of games that search for software vulnerabilities involving…

11 years ago
CBMEN, DARPA’s peer-to-peer technology for battlefieldCBMEN, DARPA’s peer-to-peer technology for battlefield

CBMEN, DARPA’s peer-to-peer technology for battlefield

DARPA is conducting a program codenamed CBMEN (Content-Based Mobile Edge Networking) for sharing of reconnaissance and Intelligence data on battlefield…

12 years ago
Mactans charger, a malicious hardware that could infect any Apple iOS devicesMactans charger, a malicious hardware that could infect any Apple iOS devices

Mactans charger, a malicious hardware that could infect any Apple iOS devices

Mactans charger, this is the name of the malicious charger that will be presented by researchers at the Black Hat 2013 conference…

12 years ago
Brilliant hacker Zatko confirms ending of Cyber Fast Track programBrilliant hacker Zatko confirms ending of Cyber Fast Track program

Brilliant hacker Zatko confirms ending of Cyber Fast Track program

The popular white hat hacker Peiter C. Zatko, aka Mudge, confirms to have ended his experience with the Cyber Fast…

12 years ago
DARPA on Cyber Targeted-Attack Analyzer program & micro-satellitesDARPA on Cyber Targeted-Attack Analyzer program & micro-satellites

DARPA on Cyber Targeted-Attack Analyzer program & micro-satellites

Protect the country, population and assets from cyber threats, this is a must for every government, a challenge for  every…

12 years ago
DARPA HACMS program for a software without pervasive vulnerabilitiesDARPA HACMS program for a software without pervasive vulnerabilities

DARPA HACMS program for a software without pervasive vulnerabilities

Technology in modern warfare has assumed a crucial role, every government is developing new cyber capabilities to be able to…

12 years ago
How to turn any phone into a spy device with hardware hackHow to turn any phone into a spy device with hardware hack

How to turn any phone into a spy device with hardware hack

No peace for mobile environment that due its impressive increase is attracting cyber criminals and hackers like never before. The…

13 years ago
U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

U.S. admit cyber attacks.Who will decide in future conflict,humans or machines?

The U.S. are one of the most advanced country under cyber warfare perspective, we have read a lot on its…

13 years ago