Risk
9/27/2012
04:36 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

14 Amazing DARPA Technologies On Tap

Go inside the labs of the Defense Advanced Research Projects Agency for a look at some of the most intriguing technologies they're developing in computing, electronics, communications, and more.
Previous
12 of 14
Next


Programming Computation on Encrypted Data, a.k.a. PROCEED, aims to make practical use of encrypted data without having to first decrypt it. A breakthrough could make it harder for hackers to develop malware, says DARPA. Pictured here is a supercomputer used by the National Security Agency for code breaking. Image credit: Austin Mills (Creative Commons)

RECOMMENDED READING

Military Transformers: 20 Innovative Defense Technologies

DARPA Demonstrates Robot 'Pack Mules'

DARPA Seeks 'Plan X' Cyber Warfare Tools

DARPA Cheetah Robot Sets World Speed Record

DARPA Demos Inexpensive, Moldable Robots

DARPA Unveils Gigapixel Camera

DARPA: Consumer Tech Can Aid Electronic Warfare

Previous
12 of 14
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Leo Regulus
50%
50%
Leo Regulus,
User Rank: Apprentice
9/28/2012 | 7:06:15 PM
re: 14 Amazing DARPA Technologies On Tap
As previously noted, CANNOT 'READ' SLIDE SHOWS.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.