Source: National Cyber Security – Produced By Gregory Evans After revelations that a compromised contractor login abetted a grandiose breach of federal employees’ background investigations, now comes word that Defense Department suppliers score below hacked retailers when it comes to cyber defense. The new industry-developed cyber rankings–and the recent Office…
SMB Cyber Defense: The Essential Building Blocks to Protect Infrastructure
Source: National Cyber Security – Produced By Gregory Evans Cyber criminals are becoming far more sophisticated as technology evolves and new and better tools become available. Another disturbing trend is that attacks are increasingly more targeted and aimed specifically at smaller organizations. In fact, the threat landscape changes and evolves…
Briton arrested on suspicion of hacking into US Defense Department
Source: National Cyber Security – Produced By Gregory Evans A British man has been arrested on suspicion of hacking into the United States Department of Defense (DoD) computer system. The 23-year-old from Sutton Coldfield was detained on Wednesday after the National Crime Agency (NCA), liaising with America’s FBI, launched a…
18-year-old Huntsville hacker working full-time as cyber defense analyst
Aleta Technologies cyber defense analyst Timothy Mullican says he’s living comfortably at the age of 18. This makes sense, as he drives a 2013 Porsche Boxster to work. When asked if he makes a comfortably living, Mullican replied, “I […] For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net…
New Orleans FD integrated harbor security program selected by DHS to participate in Chemical Defense Demonstration projects at Port of New Orleans
According to the American Association of Port Authorities, the Lower Mississippi River, where the Port of New Orleans is located, provides transportation for over 45% of all energy resources and more than 60% of all U. Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com The…
Twitter account of Israel Defense Force hacked by the Syrian cyber army
The Twitter account of the Israel Defense Force has been hacked by the Syrian cyber army. It was the official blog of the IDF as well. On the Syrian Electronics’ Army page, they have put allegation on the Israel for breaching the human rights and initiating the war crimes against…
Total Defense Cloud Security – www.totaldefense.com
http://www.totaldefense.com – Threats can attack your employees’ devices from anywhere they work. See how Total Defense Cloud Security protects today’s incre… ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com
ThreatTrack Security sets new standard in advanced threat defense
Top Priority Sector: cyber_security Reston, VA-based ThreatTrack Security has announced the availability of ThreatSecure, a cybersecurity solution that integrates network-based defenses with endpoint security and delivers threat detection with closed-loop endpoint remediation. Read More…. For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com The post ThreatTrack Security sets new…
US Defense Contracts Targeted By The Iranian Hackers Again
A group of Iranian hackers has moved from the destruction of the political sites to a new specialty called Cyberespionage. The group of hackers called the Ajax Security team was working on a number of operations against the U.S based defense contracts. They also had the intention to target Iranians…
US Defense, energy, banks hit by Internet Explorer bug
FireEye the cyber security firm revealed that Hackers have attacked the government agencies, defense contractors, energy companies and banks by exploiting the software flaw in Internet Explorer. The company discovered that hackers took advantage of a bug to secretly take control of computers. Read More…. For more information go to…