The Pentagon has confirmed a $10 million contract with a company to provide a “molar mic,” a small device clipped to the molars at the back of the mouth that enables users to speak and listen without any visible microphone or earpiece. Incoming sound passes through the jaw bone and...
Posts Tagged: communications
“A hacker claims to have stolen the upcoming season of Netflix’s hit series ‘Orange Is The New Black,’ and is demanding that the video streaming service pay an unspecified ransom to prevent all the new episodes from being prematurely released online. … Netflix said that a small production ...
By Bob Gourley The video below is an interview of Joe Klein, highly regarded IPv6 expert and cybersecurity architect and DNSSEC expert. The InternetSociety.org‘s Dan York interviews Joe and the result is a very easy to understand overview of key DNSSEC concepts. Please check it out at: http://c...
By SeanLawson This semester at the University of Utah I am teaching Communication 5620, International Communication. In our Thursday sessions, we do a round-up of weekly news items from the previous week, chosen by the students, that relate to international communication. Not surprisingly, most of t...
By Ryan Kamauff Here are the top cyber news and stories of the day. Internal Pentagon presentation details civilian workforce cuts – “The Pentagon is considering dismissing more than 5,000 civilian workers if sequestration continues into the coming fiscal year–which begins Oct. 1–according t...
By Bob Gourley Vogon’s are not bogons, but look like them. With this post we will dive a bit deeper into bogosity in networks, paying particular attention to the fundamental element of bogosity, the Bogon. We will then articulate a use case for the Centripetal Networks RuleGate which can ensure bo...
By Bob Gourley Please take a quick look at our free IP address checker at IPwonk.com That page does something very simple, it shows what IP address you are using. This use useful for many reasons. One is to confirm whether or not your proxy system is working. There are many ways to hide […...
Kevin David Mitnick, former most wanted hacker and reformed security consultant Editor’s note: Timothy Coleman is a prolific writer and analyst who publishes frequently on topics of interest to operational technologists as well as strategic technology thinkers. Olivia Wilson is an award winnin...