The Linux Foundation Identifies Most Important Open-Source Software Components and Their Problems

The Linux Foundation’s Core Infrastructure Initiative (CII) and the Laboratory for Innovation Science at Harvard (LISH) have revealed — in “Vulnerabilities in the Core, a preliminary report and Census II of open-source software” — the most frequently used components and the vulnerabilities they share. From a report: This Census II analysis and report is the first major study of its kind…

Africa Should Look To India For Digital Inspiration

Aubrey Hruby, a senior fellow at the Atlantic Council’s Africa Center, writing at Financial Times: Africa’s digital economy is still small in size compared with those of its global peers. But it has seen exponential growth over the past decade and now has the potential to redefine the continent’s economies. […] African governments and development finance institutions (DFIs) should look to…

US Interior Department To Ground Its Drones Over Chinese Spying Risk

The Interior Department is grounding its entire fleet of aerial drones (Warning: source paywalled; alternative source), one of the largest in the federal government, citing increasing concerns about the national security risk from Chinese manufacturers. The Wall Street Journal reports: The department has more than 800 drones, all of which are either made in China or have Chinese parts, according to…

FBI Investigating Alleged Hacking Attempt Into Mobile Voting App During 2018 Midterms

The FBI is investigating after someone allegedly tried to hack into West Virginia’s mobile voting app during the 2018 midterm elections. From a report: One or more people allegedly attempted to hack into Voatz, an experimental app that lets voters who are active military or registered to vote abroad cast their votes from their phones, Mike Stuart, the US attorney for…

Employees Connect Nuclear Plant To the Internet So They Can Mine Cryptocurrency

Ukrainian authorities are investigating a potential security breach at a local nuclear power plant after employees connected parts of its internal network to the internet so they could mine cryptocurrency. From a report: The investigation is being led by the Ukrainian Secret Service (SBU), who is looking at the incident as a potential breach of state secrets due to the classification…

Iran Steps Up Cyberattacks Against America

An anonymous reader quotes MarketWatch: Iran has increased its offensive cyberattacks against the U.S. government and critical infrastructure as tensions have grown between the two nations, cybersecurity firms say. In recent weeks, hackers believed to be working for the Iranian government have targeted U.S. government agencies, as well as sectors of the economy, including oil and gas, sending waves of spear-phishing…

IEEE Bans Huawei From Peer-Reviewing Papers, Chinese Scientists Quit To Protest

New submitter AntiBrainWasher writes: Running away from the fear of legal/political persecution, the New York City-based Institute of Electrical and Electronics Engineers (IEEE) told editors of its roughly 200 journals yesterday that it feared “severe legal implications” from continuing to use Huawei scientists as reviewers in vetting technical papers. They can continue to serve on IEEE editorial boards, according to the…

A ‘Cyber Event’ Disrupted the Power Grid in California and Wyoming, But Don’t Panic Just Yet

The Department of Energy says a “cyber event” disrupted operations in California, Wyoming, and Utah last month. But it’s unclear if hackers were behind it. Source: https://motherboard.vice.com/en_us/article/9kxb85/cyber-event-california-wyoming-utah-dont-panic…

Why Big-Data Science Depends on Skilled Data Engineers

As the field of data science matures, a distinct specialization is emerging: data engineering. Tech giants like Facebook, Amazon, and Google recognize the value of data engineers relative to data scientists. That’s why they’re targeting candidates with skills to build critical infrastructure like data pipelines and warehouses. The best computer science degrees keep up with […]
The post Why Big-Data Science Depends…