Risk
4/24/2012
04:14 PM
John Soat
John Soat
Slideshows
Connect Directly
RSS
E-Mail
50%
50%

U.S. Military Robots Of The Future: Visual Tour

Meet robots that fight fires, climb ladders, search for bombs, and race across the battlefield. The technological singularity is near, say military strategists.
Previous
4 of 15
Next


If publicity can go to a robot's head, then Cheetah should be one proud mechanical feline. Developed by Boston Dynamics, which was spun off from MIT's robotics laboratory several years ago, Cheetah recently garnered accolades as the "fastest robot in the world" when it set a record at 18 mph. Cheetah is just one of the so-called "legged squad support system" robot technology being developed for the military, with potential for domestic police work.

Image credit: Boston Dynamics

Recommended Reading

Asteroid Mining Plan Revealed

Google, Tech Execs Accelerate Space Privatization

IRS Database System Makes Tax Deadline, Finally

Air Force IT Strategy Stresses Mobile, Thin Clients

Federal Cyber Overhaul Cost: $710 Million Through 2017

Inside Red Cross Social Media Command Center

NASA's Blue Marble: 50 Years Of Earth Images

Top 14 Government Social Media Initiatives

Previous
4 of 15
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio