A baby-faced teenager is the key suspect behind the software that was used in the massive security breach at Target over the holidays. As many as 110 million Target shoppers had their credit card details stolen after a computer program was written to collect the credit card details of shoppers. The data…
Software and appliance company, Untangle, completes purchase of eSoft
Top Priority Sector: cyber_security Untangle, Inc., a network software and appliance company, announced on December 5 the purchase of privately-held eSoft. Read More…. View full post on The Cyber Wars
Flaws In Legit Software Cause Security Woes – Kaspersky
The root cause of internal security incidents are often down to flaws in legitimate software, says Kaspersky Lab Organisations are rightly concerned at the threat hazard posed by outside malware, but it seems that security risks within legitimate software applications is often responsible for internal cyber-security incidents. Read More…….
NSA-grade surveillance software being sold to oppressive regimes, report finds
Advocacy group Privacy International has put together an extensive report on the powerful surveillance technologies being sold by private companies. The findings, it says, are “downright scary” and show that private companies are capable of acquiring spying tools just as capable as what the NSA and GCHQ are using. The details…
DARPA awards translation software license contract to Integrated Wave Technologies
Top Priority Sector: military_force_protection The Defense Advanced Research Projects Agency (DARPA) has purchased 2,000 specialized voice translation apps from Fremont, CA-based View full post on The Cyber Wars
Offer Parents Software For Internet Safety
Specialized computer software designed to help parents protect their children on the Internet is being offered free of charge to families by the Cook County State’s Attorney’s Office. The software, called “ComputerCop,” provides a quick and easy way for parents to review what their children are doing while using…
FLETC will use Hydra/Minerva simulation software for its leadership training
Jacob Goodwin Top Priority Sector: education_training Image Caption: Read More…. View full post on The Cyber Wars
Software House and HID Global earn FICAM approval for end-to-end PACS system
Top Priority Sector: access_control_identification Software House, in conjunction with HID Global, announced on October 30 that their combined end-to-end physical access control system with high assurance readers and validation software has been approved as a fully-compliant FICAM solution by the General Services Administration (GSA). Read More…. View full post on…
DHS needs Sunflower software to track more than 300,000 of its departmental assets
Jacob Goodwin Top Priority Sector: federal_agencies_legislative In an effort to keep track of more than 300,000, vehicles, pieces of IT equipment, weapons and other assets, DHS has decided to award a sole source contract to View full post on The Cyber Wars
Software Company Tom Sawyer Hacked, 61,000 Vendors Accounts Leaked
A hacker who uses the handle Nairb has been on a leaking streak over the past few days and to continue that they have now dumped information from a software based company. View full post on Cyber War News Read More…. View full post on The Cyber Wars