Latest Electronic warfare Stories

2013-05-31 23:02:58

Using the development of the battle tank as an analogy, the authors explore the Internet´s militarization. The technology used is old, but the ideas are revolutionary. Dallas, TX (PRWEB) May 31, 2013 Center for Advanced Cyber Studies: A few nation states have started leveraging the Internet for geopolitical state gains. The risks on the Internet have drastically increased as states become involved in cyber operations, because the earlier limiting factor has not been tools or abilities,...

2013-05-31 23:02:12

Dr. Jan Kallberg will present several new scholarly findings that points out why decisive cyber conflicts will be quick, premeditated, and the exploitable weaknesses of our potential adversaries. Dallas, TX (PRWEB) May 31, 2013 During the conference Cyber Security for Government 2013, an IDGA event in Washington D.C. August 12 - 14, Dr. Jan Kallberg will summarize and disseminate his latest research and writing in how offensive strategic cyber war can be conducted and the potentially...

Chinese Hackers Access Advanced US Weapons Systems
2013-05-28 10:03:41

Peter Suciu for redOrbit.com — Your Universe Online Chinese hackers may have accessed designs for many of the United State´s most sensitive advanced weapons systems The Washington Post reported Tuesday. Among the more than two dozen major weapons systems that were breached were the F-35 Joint Strike Fighter and the PAC-3 Patriot missile system, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board. A...

Report Recommends The US Should Take Strong Action Against IP Theft
2013-05-24 04:32:05

Peter Suciu for redOrbit.com — Your Universe Online The United States government should bar companies that repeatedly steal or use stolen IP from selling their wares in the country, according to recommendations in a new report (PDF) released on Wednesday. The Commission on the Theft of American Intellectual Property, which is made up of a group of former government officials and business representatives, called on the government to take a series of measures to protect intellectual...

US Power Companies Face Constant Cyber Attacks
2013-05-23 12:50:40

Peter Suciu for redOrbit.com — Your Universe Online On Tuesday, lawmakers warned that the United States´ power utilities face near constant cyber attacks on critical systems. Congressmen Edward Markey of Massachusetts and Henry Waxman of California disclosed their findings during a House Energy and Commerce Committee hearing on cyber security. The two Democratic representatives issues the survey of utility companies, which revealed that the nation´s electrical grid...

2013-05-21 23:18:11

Detects and Prevents Cyber Attacks on Endpoint Devices On or Off the Enterprise Network Waltham, Mass. (PRWEB) May 21, 2013 Verdasys today announced availability of its cloud-based Managed Service for Cyber Defense (MSCD), a fully managed, outsourced service for companies and government agencies that need to prevent increasingly sophisticated malware and persistent cyber attacks from stealing sensitive data. MCSD leverages Verdasys' Digital Guardian data protection platform by making it...

Chinese Hackers At It Again
2013-05-20 13:28:31

Michael Harper for redOrbit.com — Your Universe Online Earlier this year, security firm Mandiant released a report which found a rash of cyber attacks against companies from the US and other English-speaking countries. These attacks were all believed to be launched from China, specifically a branch of the People´s Liberation Army (PLA) called Unit 61398, located in one 12-story building on the edge of Shanghai. In the weeks following this report´s release, cyber activity...

2013-05-14 23:28:21

From a long term cyber espionage campaign against a powerful US defense contractor, to a cash heist rivaling the largest in history, cyber attackers seem to be having their way with critical US industries according to recent headline stories. Global Digital Forensics specializes in helping organizations establish successful and current E-Defense systems to combat the ever evolving threats posed by cyber attackers. New York, NY (PRWEB) May 14, 2013 May is not even half over and already there...

2013-05-14 23:03:41

Businesses and government agencies with valuable intellectual property and other sensitive data can protect their assets from insider and cyber threats during a free live webinar, "Operationalizing a Cyber Threat Defense Program," to be held May 22, 2013, at 9:00 am ET/2:00 pm GMT and 1:00 pm ET. Waltham, MA (PRWEB) May 14, 2013 Larry Brock, former Chief Information Security Officer (CISO) at DuPont and widely recognized as one of the top security professionals in any industry, will provide...

Word of the Day
  • Exultant; jubilant; triumphant; on the high horse.
  • Tipsy; slightly intoxicated.
This word may come from the phrase 'to set cock on hoop,' or 'to drink festively.' Its origin otherwise is unclear. A theory, according to the Word Detective, is that it's a 'transliteration of the French phrase 'coq a huppe,' meaning a rooster displaying its crest ('huppe') in a pose of proud defiance.' Therefore, 'cock-a-hoop' would 'liken a drunken man to a boastful and aggressive rooster.'