Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

SpaceX Dragon Capsule Lands Safely

World's first commercial orbiter touches down in one piece following successful test launch.

Space Exploration Technologies on Wednesday successfully launched and landed a capsule capable of transporting humans to the International Space Station, marking the first time a privately-owned contractor has accomplished such a feat.

SpaceX's Dragon capsule, boosted by the company's own Falcon 9 rocket, blasted off from Florida's Cape Canaveral at 10:43 a.m. EST, following a 90-minute delay caused by a faulty indicator light. Dragon then circled the earth twice before splashing down just over three hours later in the Pacific Ocean, about 500 miles off the coast of Southern California.

"There's so much that can go wrong and it all went right," said SpaceX CEO Elon Musk, in a statement. "I'm sort of in semi-shock," said Musk, a tech entrepreneur who started electronic payments network PayPal before founding SpaceX.

SpaceX could play a key role in President Obama's plan to turn launches to the ISS over to private contractors following the retirement of NASA's space shuttle fleet next year.

The president wants the space agency to concentrate more on deep space missions—with an eye to putting a man on Mars in the next few decades—and environmental research.

The plan has drawn barbs from critics, including several members of Congress, who say it will cost jobs along Florida's Spacecoast and in other states that support NASA, and could leave the U.S. trailing Russia and China in the space race.

NASA is cooperating with SpaceX and other contractors as it looks to turn many of its traditional activities over to the private sector under its Commercial Orbital Transportation Services program.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/1/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Well I dont run on MacOS, so I need to take extra precautions"
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13659
PUBLISHED: 2020-06-02
address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.
CVE-2020-10703
PUBLISHED: 2020-06-02
A NULL pointer dereference was found in the libvirt API responsible introduced in upstream version 3.10.0, and fixed in libvirt 6.0.0, for fetching a storage pool based on its target path. In more detail, this flaw affects storage pools created without a target path such as network-based pools like ...
CVE-2020-10739
PUBLISHED: 2020-06-02
Istio 1.4.x before 1.4.9 and Istio 1.5.x before 1.5.4 contain the following vulnerability when telemetry v2 is enabled: by sending a specially crafted packet, an attacker could trigger a Null Pointer Exception resulting in a Denial of Service. This could be sent to the ingress gateway or a sidecar, ...
CVE-2020-10136
PUBLISHED: 2020-06-02
Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access cont...
CVE-2020-13757
PUBLISHED: 2020-06-01
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing exces...