Emerging Tech

Video: What Crazy Tech Idea Could Become Real?

Thought-based communication? It could happen.

Cybersecurity

Hacktivists Back Hong Kong’s Occupy Central

Government (Foreign) // Nonprofit

Cybersecurity

Police Around the Country Are Distributing Software That Makes It Easier to Hack Your Computer

ComputerCOP is intended to protect children from predators lurking on the Internet, but an investigation finds the program actually makes computers more vulnerable to abuse.

Cybersecurity

Army Network Hacked By Gamers Seeking Apache Helicopter Simulator

$100M worth of proprietary data on Xbox, Call of Duty, and other entertainment poached.

Ideas

From Off-the-Rack to Off-the-Shelf: What the Federal IT Community Can Learn from New York Fashion Week

The fashion industry grasps the importance of leveraging brands unlike any other industry. The federal IT community should take note.

Emerging Tech

Why a Refrigerator-Sized Spacecraft Could be Humanity’s Best Hope Against Solar Storms

A refrigerator-sized spacecraft will give scientists advance notice of a solar storm affecting Earth.

Cybersecurity

Intel chairman: We need more cyber offense

House Intelligence Chairman Mike Rogers picks up the trail of an ongoing dialogue between Congress and Cyber Command on the role of offense in U.S. cyber policy.

Acquisition

NASA names SEWP V winners

The government-wide IT contract's final awards were put off a month as NASA waded through 233 proposals.

Modernization

New Encryption Measures from Google and Apple Could Endanger Children, Eric Holder Says

Attorney general criticizes tech companies for locking the back door to user data.

Emerging Tech

US Is Saving Nukes So It Can Blow Up Asteroids

The government isn't destroying older bombs on schedule, because it might need them for "planetary defense."

Modernization

CMS releases trove of data on payments to doctors and hospitals

The first batch of data covers $3.5 billion in payments from firms to health professionals between Aug. 1 and Dec. 31, 2013, but CMS and the AMA warned about drawing any definitive conclusions from it.

Cybersecurity

4 cybersecurity gurus to follow on Twitter

Here are four particularly insightful cybersecurity experts worth following on Twitter.

Modernization

DARPA seeks ideas on cyber vulnerabilities and recoveries

Two recent solicitations invite researchers to look at what defense and resiliency will look like when defensive measures are able to thwart most known attack methods and adversaries look to exploit a new class of vulnerabilities.