Free Newsletters - Space - Defense - Environment - Energy
..
. Medical and Hospital News .




CYBER WARS
Italy, Germany upgrading identification friend-or-foe systems
by Staff Writers
Basildon, England (UPI) Nov 20, 2013


Malware up, hackers bypass security safeguards: survey
Washington (AFP) Nov 20, 2013 - Malicious software is on the rise both on computers and mobile devices, fueled in part by hackers' ability to bypass a key security measure, researchers said Wednesday.

McAfee Labs said in its third quarter survey that it is seeing a rise in malware which circumvents the so-called digital signature validation meant to ensure software can be trusted.

McAfee said it saw a 30 percent jump in the quarter of mobile malware that allows an attacker to bypass the digital signature validation of apps on Android devices, along with a 50 percent increase in traditional malware signed with digital signatures.

"The efforts to bypass code validation on mobile devices, and commandeer it altogether on PCs, both represent attempts to circumvent trust mechanisms upon which our digital ecosystems rely," said Vincent Weafer, senior vice president of McAfee Labs.

"The industry must work harder to ensure the integrity of these technologies given they are becoming more pervasive in every aspect of our daily lives."

McAfee's quarterly report on threats in cyberspace also cited a rise in the use of Bitcoin for illicit activities such as the purchase of drugs, weapons, and other illegal goods on websites such as Silk Road.

"As these currencies become further integrated into our global financial system, their stability and safety will require both financial monetary controls and oversight, and the security measures our industry provide," he said.

McAfee also saw cybercriminals develop Bitcoin-mining malware to infect systems, and produce Bitcoins for commercial transactions.

Bitcoins allow the creation of new currency through a process known as mining, according to McAfee. While initially people used their own computing resources for mining, certain kinds of malware allow attackers to employ infected computers to produce Bitcoins, often without their knowledge.

The NATO Support Agency has given Selex ES a $4 million contract to provide four SIR-M5-E interrogator friend-or-foe systems to the Italian Air Force.

The IFF systems will equip four FPS-117 defense radar systems by Lockheed Martin, a three-dimension, long-range, phased radar system.

The SIR-M5-E IFF has a range of more than 279 miles and was developed by Selex ES to meet NATO and U.S. military standards.

The Mode 5 system can clearly recognize aircraft detected by the air defense radar, even in a crowded environment and with electronic jamming, Selex ES said.

"This contract is a demonstration of how Selex ES's IFF products are developed with interoperability and common standards in mind, which makes them easy to integrate with radar systems designed by third-party manufacturers," the company said.

"Previously, in January 2012, the Italian Ministry of Defense ordered two SIR-M5-E to equip the two Italian Air Force TPS -77 mobile air defense radar systems manufactured by Lockheed Martin."

IFF systems are essential in air defense systems for discriminating between friendly and enemy aircraft, and a program is under way to upgrade all IFF NATO systems by 2020.

Germany's IFF systems on aircraft, ships and in use on Army ground stations are being upgraded by Cassidian, a subsidiary of EADS.

Under a contract from the Federal Office of Bundeswehr Equipment, Information Technology and In-Service Support, Cassidian is converting existing MSSR 2000 I secondary radar systems to the new Mode 5 standard.

EADS said Cassidian will undertake the project in two phases. First it will modernize the MSSR 2000 I, or Monopulse Secondary Surveillance Radar, on one German Navy ship in each class as well as a German Army mobile system and two ground radar systems. In the second phase, it will modernize all remaining naval and ground secondary radars and IFF transponders aboard aircraft.

EADS did not disclose the value of the contract to Cassidian, the number of units to be modernized and the contract's timeline.

Unlike the Mode 4 IFF system in current use by the German military, Mode 5 uses sophisticated encryption techniques to protect against electronic counter-measures.

"During the U.S. Army's Bold Quest 2013 exercise, Cassidian provided the participating German troops with IFF equipment supporting Mode 5 for the entire action chain: MSSR 2000 I interrogators deployed in a German Air Force C160 Transall mission aircraft and state-of-the-art QRTK3/4NG cryptographic computers." EADS said. "This equipment proved its interoperability with the [NATO] alliance partners' Mode 4 and Mode 5 IFF systems and demonstrated the problem-free functioning of the next-generation Mode 5 IFF standard, which is to be introduced by NATO forces from 2014."

Cassidian IFF systems for ground and naval forces are in use in Britain and France.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
US panel urges punishment for China cyber spying
Washington (AFP) Nov 20, 2013
A US panel Wednesday called for tougher action against China, including possible sanctions to stop cyber spying, warning that Beijing has yet to be persuaded to end rampant espionage. In an annual report to Congress, the US-China Economic and Security Review Commission charged that Beijing "is directing and executing a large-scale cyber espionage campaign" that has penetrated the US governme ... read more


CYBER WARS
Informal supply chains help feed typhoon survivors

Blow-up hospitals help Philippine typhoon effort

Australia-Indonesia relations dip further amid spying row

Slog begins to rebuild Philippines' typhoon wastelands

CYBER WARS
CIA, Pentagon trying to hinder construction of GLONASS stations in US

GPS 3 Prototype Communicates With GPS Constellation

Russia to enforce GLONASS Over GPS

How pigeons may smell their way home

CYBER WARS
Ancient, modern DNA tell story of first humans in the Americas

DNA of early hominid found to include 'mystery' early genes

China one-child law change small but crucial: experts

Dogs likely originated in Europe more than 18,000 years ago

CYBER WARS
Land management as a key to countering butterfly declines

Climate change may disrupt flight season of Canadian butterflies

Researchers identify genomic variant associated with sun sensitivity, freckles

Nature's Glowing Slime: Scientists Peek into Hidden Sea Worm's Light

CYBER WARS
New malaria vaccines roadmap targets next generation products by 2030

Indonesian woman dies of bird flu: health ministry

Technology helps Nigeria's fight against polio

How zinc starves lethal bacteria to stop infection

CYBER WARS
Top China court calls for end to confession through torture

China reform pledges show Xi assuming Deng mantle: analysts

End to China labour camps cheered -- but what next?

China reform plan impresses, but analysts watch effects

CYBER WARS
Spain jails six Somalis for piracy

Pirates kidnap two American sailors off Nigeria

Seaman Guard owner to fight arrest of ship's crew in India

Somali pirates on trial for seizing French yacht

CYBER WARS
Ukraine risks financial meltdown after break with EU

China unveils reforms to ease grip on economy

EU disciplines members over bloated budget deficits

China Communist Party vows to deepen reforms at key meeting




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement