The cyber threats to watch in 2013
Happy almost 2013. IT security firm McAfee has just released a report on what it thinks will be the biggest trends in cyber for the new year. The report list several broad trends that we'll mention...
View ArticleIs China really going to start building these supersonic bombers?
While the Western media has been focusing a lot on China's sexiest new military toys -- stealth fighters, drones, ballistic missiles, and aircraft carriers -- we may have missed a relatively unsexy...
View ArticleThe Pentagon is expanding its smartphone for spies program
While the rest of the DC press corps is talking about Chuck Hagel's qualifications to be the next defense secretary, Killer Apps is lucky enough to be writing about smart phones. Secret smart phones,...
View ArticleIf SecDef, Hagel would move quickly on key cyber issues
Cyber will grow as a priority at the Pentagon if former Nebraska Senator Chuck Hagel is confirmed as the next secretary of defense, according to government officials involved in supporting his...
View ArticleLet freedom ring: Gen. Cartwright says 4G is America's lasting legacy in...
What will the longest-lasting and perhaps most important legacy of the United States' 11-year war in Afghanistan be? A 4G cell phone network capable of supporting smartphones. That's right, according...
View ArticleIs this video from the RQ-170 stealth drone captured by Iran?
Late last week, Iran released photos and videos of a very fake-looking stealth fighter jet. This week, Tehran may have done a little bit better. This video, posted to YouTube on Wednesday, shows what...
View ArticleIs this another secret drone base on the Arabian Peninsula?
View Larger MapDriving Directions Well done to Danger Room for finding the needle in the haystack. On Thursday, the Wired.com blog posted this article showing an insanely remote military airstrip being...
View ArticleDARPA wants to watch you type
DARPA is getting serious about one of the issues that cyber-security professionals inside and outside government regularly bemoan: the relative inability of weak passwords to protect...anything. To...
View ArticleHere's how the U.S. wants to confront foreign (Chinese) cyber theft
A week after releasing its cyber security executive order, the White House today unveiled its strategy to fight back against the wave of intellectual property (IP) theft facilitated by cyber espionage...
View ArticleStuxnet is way older than we thought
Think you knew all there was to know about Stuxnet, the worm that was discovered in 2010 to have destroyed thousands of uranium enrichment centrifuges at Iran's Natanz nuclear facility? Think again....
View ArticleChinese surface-to-air missiles are being used by Syrian rebels
This is interesting. The YouTube video below apparently shows what's looks like a Syrian air force Mi-8 Hip transport chopper being shot down by Syrian rebels using what appears to be a Chinese-made...
View ArticleChina's second stealth jet may be a carrier fighter
Welcome to Monday. It appears that China may indeed be working to turn its second stealth fighter, the J-31, into an aircraft carrier-borne fighter. The chief designer of the J-31 (as well as China's...
View ArticleCyber Command fielding 13 "offensive" cyber deterrence units
Army Gen. Keith Alexander, head of United States Cyber Command, dropped several interesting nuggets about the military's cyber forces during a Senate Armed Services Committee hearing today. First off,...
View ArticleThe government's cyber vulnerabiity database was infected with malware (Updated)
The National Institute for Standards and Technology or NIST -- the government institute responsible for bringing together critical infrastructure providers to decide the minimum cyber security...
View ArticleThe future of amphibious warfare is airborne
How's the United States Marine Corps, which bills itself as an amphibious force, going to fight in a world where potential U.S. enemies are stockpiling radars and missiles to keep ships that carry...
View ArticleBalkan Ghosts: Proof Croatia is sending weapons leftover from '90s wars to...
Remember how Croatia denied it had any involvement in shipping weapons to the Syrian rebels? (Despite photos of Jordanian military-owned transport planes loading up at Croatian airports.) Well, the...
View ArticleThe takeaway from Verizon's cyber security report: Cybercrime is way too easy
Verizon's annual report on the latest trends in cyber-threats, one that is frequently referred to each year by cyber security experts, is out this week. Its big message? Low-tech threats pose the...
View ArticleVideo: The Navy's stealth drone makes its first arrested landing
Happy Monday. Here's some drone history being made: This video shows the U.S. Navy's X-47B Unmanned Combat Air System demonstrator (UCAS-D) making its very first arrested landing. On May 4, the...
View ArticleThe White House: Cyber attacks against critical infrastructure are way up
Here's the White House's response to Killer Apps' request for comment on last night's Wall Street Journalarticle citing current and former administration officials saying that Iranian hackers have...
View Article