Cybersecurity firm: Chinese hacking on US companies persists

Source: National Cyber Security – Produced By Gregory Evans Chinese hacking attempts on American corporate intellectual property have occurred with regularity over the past three weeks, suggesting that China almost immediately began violating its newly minted cyberagreement with the United States, according to a newly published analysis by a cybersecurity…

read more

FBI Cyber Cop Joins Security-Software Firm

Source: National Cyber Security – Produced By Gregory Evans Leo Taddeo, a top cyber cop at the Federal Bureau of Investigation, is leaving after more than two decades in government to become the chief security officer at security-software company Cryptzone. Mr. Taddeo, 49, is stepping down as the head of…

read more

Told U.S. is hacker, firm probes

Source: National Cyber Security – Produced By Gregory Evans  Powered by Max Banner Ads BERLIN — Gemalto, the largest maker of mobile-phone cards, said it’s investigating a report that U.S. and U.K. spies allegedly hacked into its computer network to steal the keys used to encrypt conversations, messages and data traffic….

read more

Minority office report: Warning over software now being used by bosses that predicts if you’re going to steal from the firm, have a nervous breakdown and even have an office affair

Source: National Cyber Security – Produced By Gregory Evans  Powered by Max Banner Ads It sounds like something straight from a science-fiction film – but technology firms in Japan are using software to predict whether a rogue employee could steal from the company or even have an office affair. Fulfilling the…

read more

Spotsylvania tech firm works on Memex project featured on ’60 Minutes’

Source: National Cyber Security – Produced By Gregory Evans  Powered by Max Banner Ads IST Research’s 24 employees have fairly typical backgrounds for the Fredericksburg region. They’re government contractors, retired military personnel and recent college graduates. But their work creating technology for the developing world and mining the Internet for data…

read more