defense contractors

defense contractors

Pentagon to expand cybersecurity program for defense contractors

www.washingtonpost.com
The Pentagon is expanding and making permanent a trial program that teams the government with Internet carriers to protect defense firms’ computer networks against massive data theft by foreign adversaries. Read full article >>...
Pentagon to expand cybersecurity program for defense contractors

Android in camouflage: How the military can utilize smartphone tech

gigaom.com
Android is still the smartphone platform of choice for the world’s consumers, but it may also be the ideal operating system for the world’s armies, navies and security agencies. The versatile, open – and free – OS already has most of the necessary pieces in place to power the most...
Android in camouflage: How the military can utilize smartphone tech
President Obama signs cybersecurity order

Chinese hackers resume attacks on U.S. targets

www.pcworld.com
For the last three months or so, the U.S. government and some of its defense contractors have engaged in a war of shame on China to pressure it to cool its cyber-attacks on U.S. targets. The campaign appeared to be yielding results, but it seems that Chinese hackers were...
Chinese hackers resume attacks on U.S. targets

Half the Members of an “Independent Panel” Appointed to Study the Quadrennial Defense Review Have Financial Ties to Defense Contractors

www.prisonplanet.com
Half the Members of an “Independent Panel” Appointed to Study the Quadrennial Defense Review Have Financial Ties to Defense Contractors
17 Of The Most Mysterious 'Skunk Works' And Corporate Labs

Researchers unearth more Chinese links to defense contractor attacks

www.computerworld.com
Symantec researchers have uncovered additional clues that point to Chinese hacker involvement in attacks against a large number of Western companies, including major U.S. defense contractors....
Researchers unearth more Chinese links to defense contractor attacks

Windows 8 ramps up early malware detection

www.csoonline.com
In Windows 8, Microsoft has greatly improved the operating system's ability to detect malware before it has a chance to run, experts say. Windows 8 should also make it more difficult for people to unknowingly install malware in the first place. The latest version of the OS, officially launched...
Windows 8 ramps up early malware detection

Lessons from the hack attack on The New York Times

www.csoonline.com
The New York Times' description of a cyberespionage campaign waged against the news media company by Chinese hackers demonstrates the importance of assuming criminals will eventually break into a computer system, and the best defense is to detect the intrusion as soon as possible. Last week, The Times disclosed...
Lessons from the hack attack on The New York Times

When a defense contractor gets hacked repeatedly, you know cybersecurity is a problem

gigaom.com
QinetiQ North America, a prominent defense contractor to the U.S. government, endured extensive on-again-off-again hacks in 2007-2010 from spies in China, resulting in the loss of many terabytes of sensitive data, including more than 10,000 passwords, chip architecture for military robots and weapon information, according to an article from Bloomberg...
When a defense contractor gets hacked repeatedly, you know cybersecurity is a problem

Apple Could Buy T-Mobile With Its Q1 Earnings

www.readwriteweb.com
Apple reported another very successful financial quarter this afternoon, exceeding expectations. In the quarter ending March 31, the company brought in a net profit of $11.6 billion on a grand total of $39.2 billion in revenue. As has been the case in recent quarters, the vast majority of Apple's...
Apple Could Buy T-Mobile With Its Q1 Earnings

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks

www.pcworld.com
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG).Forty-seven percent of all phishing attacks recorded worldwide during the second half of 2012 involved such mass break-ins, APWG...
Hackers increasingly target shared Web hosting servers for use in mass phishing attacks

Virtual Training World For Law Enforcement Inflicts Real Pain

www.fastcompany.com
One of the world's top special effects houses is teaming up with one of the world's biggest defense contractors to create a fully immersive virtual reality training world for SWAT teams and other law enforcement types. Motion Reality and Raytheon's newly released civilian VIRTSIM system is a 360 degree, physically...
Virtual Training World For Law Enforcement Inflicts Real Pain

What businesses can expect from U.S.-China talks on cybersecurity

www.geekwire.com
U.S. President Barack Obama and Chinese President Xi Jinping will meet at a secluded estate in Southern California starting today for two days of talks on a host of bilateral and global issues. Among them will be cybersecurity, which has quickly risen in prominence to the top of the Sino-American...
What businesses can expect from U.S.-China talks on cybersecurity
And the top city for finding a software job is -- wait, DC? What?

Anonymous Hackers Release Norton AntiVirus 2006 Source Code

www.businessinsider.com
Hackers associated with Anonymous published the source code for Symantec’s Norton AntiVirus 2006 on The Pirate Bay late Thursday evening, according to Zach Wittaker at ZDNet. The 1.07 GB download file includes the source code to a number of products within the software, including the consumer version, the corporate edition...
Anonymous Hackers Release Norton AntiVirus 2006 Source Code

Fearmongering About Cyberwar And Cybersecurity Is Working: American Public Very, Very Afraid

www.techdirt.com
Well, it looks like all the fearmongering about hackers shutting down electrical grids and making planes fall from the sky is working. No matter that there's no evidence of any actual risk, or that the only real issue is if anyone is stupid enough to actually connect such critical infrastructure...
Fearmongering About Cyberwar And Cybersecurity Is Working: American Public Very, Very Afraid

CNET: Justice Department asking service providers dodge Wiretap Act, granting immunity for cooperation

www.engadget.com
It's funny how a few tweaks can make a Government program go from completely legal, to questionably so. A new secret authorization puts the US Justice Department on the fuzzy side of the legal line, approving the expansion of a program originally intended to monitor the internet traffic of...
CNET: Justice Department asking service providers dodge Wiretap Act, granting immunity for cooperation

Director Of National Intelligence Admits That There's Little Risk Of A 'Cyber Pearl Harbor'

www.techdirt.com
We've been pointing out for years that all the talk about "cyberattacks" and "cybersecurity" appear to be FUD, mostly designed to scare up money for "defense" contractors looking for a new digital angle. And yet, we keep seeing fear-mongering report after fear mongering report insisting that we're facing imminent threats...
Director Of National Intelligence Admits That There's Little Risk Of A 'Cyber Pearl Harbor'

Research | Google's Quantum Computer Proven To Be Real Thing (Almost)

www.wired.com
Google bought one. And so did Lockheed Martin, one of the planet's largest defense contractors. But we still can't agree on what it is. D-Wave, the company that built the thing, calls it the world's first quantum computer, a seminal ......
Research | Google's Quantum Computer Proven To Be Real Thing (Almost)
AT&T getting secret immunity from wiretapping laws for government surveillance

Trojan Targets Industry, Government with Fake Conference Invitations

www.eweek.com
Attackers targeted executives in the defense industry and government officials with fake invitations to conferences to install the MSUpdater Trojan to steal sensitive data. - Researchers discovered malware that has been used in targeted attacks against defense contractors, government agencies and other organizations since early 2009, according to IT security...
Trojan Targets Industry, Government with Fake Conference Invitations

U.S. panel labels China largest cyberspace threat, report says

news.cnet.com
China is increasingly using hackers to infiltrate U.S. military computers and defense contractors, according to a draft of Congressional report obtained by Bloomberg. [Read more]...
U.S. panel labels China largest cyberspace threat, report says
Creepy 'Google for Spies' Mines Your Social Networks to Predict What You'll Do Next

Antivirus startup linked to infamous Chinese hacker

www.csoonline.com
Anvisoft, a Chinese antivirus startup, has been linked to an infamous hacker suspected of developing sophisticated malware used to siphon sensitive information from Defense Department contractors in 2006. Through some high-tech sleuthing on the Web, Brian Krebs, author of the KrebsonSecurity blog, found Anvisoft-connected IP addresses connected Anvisoft to...
Antivirus startup linked to infamous Chinese hacker
Chinese hackers drain U.S. military secrets from defense contractor
Now you can simulate your world for (relatively) cheap in the cloud

Shockingly Unshocking: 'Cybersecurity' FUD Has Been Big Big Business For Contractors

www.techdirt.com
Back when this hype about "cybersecurity" and "cyberwar" first started to hit the mainstream (early on, "cyberwar" was more common, but lately people focus on "cybersecurity"), we had an article which suggested that much of this really seemed to be about scaring up a panic for the sake of throwing...
Shockingly Unshocking: 'Cybersecurity' FUD Has Been Big Big Business For Contractors

As Congress Debates CISPA, Companies Admit No Real Damage From Cyberattacks

www.techdirt.com
Since the beginning of the cybersecurity FUDgasm from Congress, we've been asking for proof of the actual problem. All we get are stories about how airplanes might fall from the sky, but not a single, actual example of any serious problem. Recently, some of the rhetoric shifted to how it...
As Congress Debates CISPA, Companies Admit No Real Damage From Cyberattacks
Infographic Shows With Stunning Clarity How Domestic Drone Use Is The New Normal
× Just a test of the new info bar. What do you think?