Nextgov - All Content technology news, best practices, and web 2.0 tools.en-usFri, 22 Aug 2014 16:40:13 -0400Hackers Taint the Caribbean, Smuggle Patient Data, and Bring Gaza to Delaware another week in ThreatWatch, our regularly updated index of noteworthy data breaches.Aliya SternsteinFri, 22 Aug 2014 16:40:13 -0400 Court Move Clear the Way to Mass Government Hacking? single warrant could authorize federal officials to inject malware into hundreds of suspects’ -- and victims’ -- computers.Aliya SternsteinFri, 22 Aug 2014 16:26:51 -0400 Todd Park to Step Down as Federal CTO plans to move to Silicon Valley, where he will help recruit tech talent for government jobs.Nextgov StaffFri, 22 Aug 2014 15:31:52 -0400 BriefingTodd Park, federal CTOPablo Martinez Monsivais/APScientists Figure Out Why Grunts Groan’s the ever-increasing load, researchers at the International Congress on Soldiers' Physical Performance conclude.Bob BrewinFri, 22 Aug 2014 14:05:23 -0400 - What's BrewinDeployed from USS Bataan and arriving in Afghanistan with a heavy backpack, a Marine with the 26th Marine Expeditionary Unit (Special Operations Capable), dons his backpack by laying his back on it.U.S. NavyNew Navy Shipboard Net Key to Information Dominance network aims to automate cyber defense.Bob BrewinFri, 22 Aug 2014 13:54:13 -0400 guided-missile destroyer USS Higgins operates off the coast of Haiti.U.S. NavyThese Cute, Tiny Sensors Will Soon Be Watching You Everywhere beacons send unique Bluetooth radio pulses, which a mobile device can recognize.Dan Frommer, QuartzFri, 22 Aug 2014 12:49:00 -0400 DataEstimoteThese Are the 25 Most Popular Mobile Apps in America is an interesting slice of the App Store, as it highlights active usage, not just one-time downloads or recent popularity.Dan Frommer, QuartzFri, 22 Aug 2014 12:11:02 -0400 Bloom Design/Shutterstock.comHow Data Analytics Can Help Root Out Food Stamp Fraud data analytics can help the Agriculture Department detect fraud early -- and even stop it from happening.John CassaraFri, 22 Aug 2014 10:52:50 -0400 TechM. Spencer Green/AP UPS Discloses Breach at 51 Stores Department of Homeland Security said a type of malicious software known as 'Backoff' is likely to blame.Nextgov StaffThu, 21 Aug 2014 17:38:21 -0400 Parcel Service driver Marty Thompson starts his truck up after making a delivery in Cumming, Ga. David Goldman/APEntire Manhattan Project History Declassified and Now Online final two volumes of A-bomb history became available in the past month.Bob BrewinThu, 21 Aug 2014 16:45:17 -0400 - What's BrewinThis is an aerial view of the aftermath of the first atomic explosion at Trinity Test Site, New Mexico, July 16, 1945.AP PhotoAgencies Get New Guidelines for OK’ing Apps new guide is aimed at preventing staff from both oversharing and inadvertently welcoming in hackers.Aliya SternsteinThu, 21 Aug 2014 16:05:08 -0400 Secret White House Crisis Communication Network Gets Upgrade Crisis Management System supports voice and video calls.Bob BrewinThu, 21 Aug 2014 15:45:44 -0400 Barack Obama listens during one in a series of meetings discussing the mission against Osama bin Laden, in the Situation Room of the White House.The White House/AP File PhotoRep. Eshoo Calls for ‘Re-brand’ of Net Neutrality “can’t tell which jargon box to check,” says the California Democrat.Alex Brown, National JournalThu, 21 Aug 2014 15:22:38 -0400 BriefingRep. Anna Eshoo, D-Calif.Charles Dharapak/AP File PhotoBig Win for Amazon: First Provider Authorized to Handle Sensitive DOD Workloads in Cloud provisional authority to operate under DOD’s cloud security model at impact levels 3-5.Frank KonkelThu, 21 Aug 2014 13:53:42 -0400 House to Agencies: Embrace Offbeat Methods for Buying Tech procurement methods can provide agencies with more bang for their buck, White House officials say.Jack MooreThu, 21 Aug 2014 13:11:16 -0400 BriefingShutter_M/Shutterstock.comFor Coders, Tests Will Replace Resumes and Interviews company has built a platform where computer scientists attempt coding challenges and contests that measure them—in real time—for speed, accuracy, completeness and elegance of their work.Max Nisen, QuartzThu, 21 Aug 2014 11:03:04 -0400 BriefingUndrey/Shutterstock.comInfographic: Adorable Animals and Their Deadly Diseases may change your mind about that trip to the petting zoo.Caitlin FairchildThu, 21 Aug 2014 10:45:21 -0400 bats like these are involved in the spread of the Ebola virus. Rob Griffith/APThe Battle Over Government-Run Internet Heats Up at FCC Republican aide claims the federal agency can't overturn state restrictions.Brendan Sasso, National JournalThu, 21 Aug 2014 07:00:00 -0400 Briefingasharkyu/Shutterstock.comNavy Drops $2.5 Billion in Contracts to Update Shipboard Networks networks will upgrade security and intelligence systems, the Navy said.Bob BrewinWed, 20 Aug 2014 18:30:55 -0400 littoral combat ship USS Freedom is conducting sea trials in the Pacific Ocean off the coast of Southern California. U.S. NavyPro-Palestinian Hackers Deface Delaware State Treasury Site defaced the site with messages including: ‘Hacking sites will not STOP!!! Unless Gaza is Free.'Nextgov StaffWed, 20 Aug 2014 17:01:40 -0400 Flogel/Shutterstock.comIs There Ebola on That Smartphone? an iPad with alcohol could erase data as well as germs.Aliya SternsteinWed, 20 Aug 2014 16:52:43 -0400 family sit near the body of their mother suspected of dying from the Ebola virus, as the father, right, tries to contact family members on his mobile phone, in Monrovia, Liberia.Abbas Dulleh/APInfographic: What is the Energy Department Doing in Space? agency has sent its technology out far beyond our atmosphere.Caitlin FairchildWed, 20 Aug 2014 16:36:47 -0400 TechThe Cassini Probe, sent to Saturn in 1997.NASAGSA Does Bombers Too out, the federal government’s landlord supports the B-2 stealth bomber.Bob BrewinWed, 20 Aug 2014 16:33:13 -0400 - What's BrewinA B-2 Spirit bomber soars during a deployment to Andersen Air Force Base, GuamU.S. Air ForceDOT Wants Cars to ‘Talk’ to Each Other communications system could cost billions of dollars a year.Bob BrewinWed, 20 Aug 2014 16:22:04 -0400 TechMy Life Graphic/Shutterstock.comChinese Hackers Targeted MH 370 Investigation and Appear to Have Stolen Classified Documents hackers targeted the computers of high-ranking officials from the Malaysian government.Daniel A. Medina, QuartzWed, 20 Aug 2014 15:40:35 -0400 Malaysia Airlines Boeing 737-800 plane sits on tarmac at Kuala Lumpur International Airport in Sepang, Malaysia.Vincent Thian/AP