Quantcast

Latest Electronic warfare Stories

Unit Within Chinese People's Liberation Army Linked To Online Spying
2014-06-10 10:50:26

Peter Suciu for redOrbit.com - Your Universe Online Unit 61398, the not-so-secret cyber warfare branch of the Chinese People's Liberation Army (PLA), might not be working entirely alone. On Monday CrowdStrike identified another group that has been dubbed Putter Panda, a cyber-espionage team that conducts operations from Shanghai and reportedly works on behalf of the PLA's 3rd Department 12th Bureau Unit 61486. CrowdStrike, a US security firm, released a detailed report that casts...

2014-06-05 08:21:44

GAITHERSBURG, Md., June 5, 2014 /PRNewswire/ -- Lockheed Martin (NYSE: LMT) commemorated the tenth anniversary of the formal creation of its enterprise cyber defense organization, the Lockheed Martin Computer Incident Response Team (LM-CIRT), by discussing the growing cyber threats facing corporate and government networks and looking forward to delivering another decade of cyber security services. http://photos.prnewswire.com/prnvar/20110419/PH85737LOGO-b At a celebration in one of the...

2014-06-03 12:34:05

iThreat Cyber Group & InsideCounsel Magazine Gauge Corporate Ability to Thwart Adversarial Attacks PRINCETON, N.J., June 3, 2014 /PRNewswire/ -- Two out of three legal counsels representing a cross section of Fortune 1,000 companies acknowledge they are not "very well prepared" to prevent a significant, material attack on their product, brand or intellectual property, according to a new survey by InsideCounsel Magazine commissioned by iThreat Cyber Group. "These results are telling," stated...

2014-05-29 23:01:25

Providing timely information through high data rate communications enhances the situational awareness of military units engaged in combat and can be vital to their safety and the success of their mission. Such high data rate communications systems require amplifiers with broad bandwidth and high power, which can be delivered by the compact helical traveling wave tubes (TWT), under development at Teraphysics Corporation of Cleveland, Ohio. Cleveland, OH (PRWEB) May 29, 2014 Providing...

2014-05-28 23:06:51

Showcases Real-Life Cyber Scenarios That Can Negatively Impact Federal Agencies Warwick, NY (PRWEB) May 28, 2014 SwishData, a woman-owned group of leading data performance architects for the federal marketplace, today announced the launch of a new online resource called “Cyber Attack Defenders,” which shines a light on the real dangers and realities that federal agencies face when it comes to cyber security. The first video in the campaign called “The Defenders” showcases a...

2014-05-22 16:22:16

Accudata CEO to Chair Summit Day Two Featuring Live Hacking Demo & Industrial Operations Security HOUSTON, May 22, 2014 /PRNewswire/ -- Accudata Systems today announced participation in the IQPC 2(nd) Annual Cyber Security for Oil and Gas Summit to be held June 16-18th in Houston, Texas. Conference Day Two will be chaired by Accudata CEO, Patrick Vardeman. Oil and gas industry leaders will converge at this summit to address critical cyber security threat concerns and trends. June 16(th) is a...

2014-05-22 08:21:38

Silicon Valley Defense Manufacturer Meets Stringent Specifications for Reliability, Threat Detection FREMONT, Calif., May 22, 2014 /PRNewswire-iReach/ -- dB Control, a defense electronics manufacturer, was awarded a large contract by a major Asian military customer to design and manufacture high-power traveling wave tube (TWT) transmitters for an airborne program. Terms of the contract prohibit dB Control from naming the customer and product specifications. Photo -...

cybercrime china
2014-05-19 12:00:28

Peter Suciu for redOrbit.com - Your Universe Online On Monday the United States Department of Justice (DOJ) announced that cyber-spying charges had been filed against five officers of the Chinese military. The DOJ accused them of stealing trade secrets from six US companies. This is the first such case where an indictment for economic espionage has been brought against foreign government officials. The officers were identified as Wang Dong, Sun Kailiang, Wen Xinyu, Huang Zhenyu, and Gu...

2014-05-14 16:34:03

Public/Private collaboration aims to strengthen defenses against cyber attacks and protect customers ARLINGTON, Va., May 14, 2014 /PRNewswire-USNewswire/ -- Today the Retail Industry Leaders Association (RILA), along with several of America's most recognized retail brands, launched the Retail Cyber Intelligence Sharing Center (R-CISC). The R-CISC is an independent organization, the centerpiece of which is a Retail Information Sharing and Analysis Center (Retail-ISAC). Among those companies...

2014-05-07 08:40:29

REDWOOD CITY, Calif., May 7, 2014 /PRNewswire/ -- ThreatStream, a next generation cyber intelligence company that enables the disruption of cyber attacks in real-time, today announced the appointment of big data security luminary, Jason Trost (formerly with Endgame, Inc.), to lead its data science vision. "Jason is one of the few in the industry that has been pushing the envelope - utilizing big data platforms to address cyber security challenges. He is a perfect fit within our long...


Word of the Day
jument
  • A beast of burden; also, a beast in general.
'Jument' ultimately comes from the Latin 'jugum,' yoke.
Related