Security Research shows 30 technical details along with exploit code in oracle’s Java Cloud. Some of these exploits allows to modify user’s data and even execute malacious codes. Poland-based Security Explorations typically withholds such public airings until after any vulnerabilities have been fixed to prevent them from being exploited maliciously. …
BRS Labs to demonstrate enhanced cloud service, AISight 5.0 at ISCW event
Top Priority Sector: video_surveillance_cctv Houston, TX-based Behavioral Recognition Systems (BRS Labs), creator of the AISight platform, the artificial intelligence analytics solution that teaches itself to recognize and alert on unexpected patterns within massive volumes of sensor data, will demonstrate a new, lower-cost cloud-based AISight intelligent video analytics service at the…
MTN Government launches Social Media threat intelligence managed service
Top Priority Sector: cyber_security Leesburg, VA-based MTN Government (MTNGOV), a subsidiary of MTN Communications (MTN) and a provider of satellite communications, cybersecurity, and integrated intelligence, surveillance, and reconnaissance solutions serving U. Read More…. View full post on The Cyber Wars
Motorola Solutions awarded first Public Service TETRA Radio Project by the Royal Brunei Police Force
Top Priority Sector: law_enforcement_first_responders Schaumburg, Illinois-based Motorola Solutions, a provider of mission-critical communication solutions and services for government and enterprise customers, has been awarded a multimillion dollar contract to provide a nationwide Terrestrial Trunked Radio (TETRA) digital radio network to the Royal Brunei Police Force (RBPF). Read More…. View full…
IBM offers new cybersecurity consulting service to protect critical infrastructure
Ashley Bennett Top Priority Sector: cyber_security IBM has unveiled a new cybersecurity consulting service to help critical infrastructure organizations utilize the new NIST Cybersecurity Framework that was recently released by the Obama Administration and the Department of Commerce’s National Institute of Standards and Technology (NIST). Homepage position: 1 For more…
Lastline’s Innovative Anti-Hacking Service Detects and Protects Against Malware Code
Traditional anti-virus software is designed to detect the malware, or malicious software, before it disrupts and then distributes sensitive, personal information to unintended recipients. The trouble with some of those software programs, however, is speed and accuracy. As technology has progressed, so have the cyber hackers, a detail not lost on UC Santa…
Gregory B. Starr becomes the first Diplomatic Security Service agent to serve as assistant secretary for diplomatic security
Ashley Bennett Top Priority Sector: federal_agencies_legislative Former Diplomatic Security Service Special Agent Gregory B. Read More…. View full post on The Cyber Wars
GAO backs U.S. Marshals Service in protest over an air charter services contract
Jacob Goodwin Top Priority Sector: security_services Image Caption: Read More…. View full post on The Cyber Wars
Secret Service wants to maintain and upgrade 48 barriers, bollards and gates protecting the White House
Jacob Goodwin Top Priority Sector: perimeter_protection Image Caption: Read More…. View full post on The Cyber Wars
Anonymous OpNSA Public Service Announcement: Tor Exploit
Join the Army http://facebook.com/ArmyAnonymous Twitter: https://twitter.com/AnonymousOpNSA IRC: https://webchat2.anonops.com/?channels=opnsa. ________________________ https://gregorydevans.com – http://gregorydevans.wordpress.com – http://hackerforhire.com – http://hackerforhireusa.com