CID warns Army community about social media impersonation of Soldier accounts
Posted on
DefenceTalkU.S. Army Criminal Investigation Command’s (CID) Computer Crime Investigative Unit (CCIU) is once again warning Soldiers and the Army community to be on the lookout for “social media scams” where cybercriminals impersonate service members by using actual and fictitious information, not just for “trust-based relationship scams,” also known as Romance Scams, but for other impersonation […]https://www.defencetalk.com/cid-warns-army-community-about-social-media-impersonation-of-soldier-accounts-71459/
China bans Win 8; accuses US of hypocrisy as cyber row grows
Posted on
DefenceTalkBeijing summoned the US ambassador and accused Washington of double standards Tuesday as a diplomatic row escalated over the unprecedented indictment of five Chinese military officers for cyber-espionage. The world’s top two economies have long been at loggerheads over hacking and China’s defence ministry denounced Washington’s allegations as “a pure fabrication by the US, a […]https://www.defencetalk.com/china-bans-win-8-accuses-us-of-hypocrisy-as-cyber-row-grows-59657/
European IT firms seize opportunity from spy scandal
Posted on
DefenceTalkEuropean IT security firms have flocked to the world’s biggest high-tech fair with hopes of benefiting from the fallout from shock revelations of mass US and British spying. Exactly a year ago, Chancellor Angela Merkel vaunted her new, ultra-secure Smartphone at the opening of the same fair, the CeBIT, in the northern city of Hanover. […]https://www.defencetalk.com/european-it-firms-seize-opportunity-from-spy-scandal-58985/
NSA taps offline computers with secret bug: report
Posted on
DefenceTalkThe US National Security Agency has developed a secret technology to spy on computers via radio signals, gathering information even when the devices are offline, a report said Wednesday. The New York Times reported that the NSA has implanted software on 100,000 computers around the world to be able to conduct surveillance, and which gives […]https://www.defencetalk.com/nsa-taps-offline-computers-with-secret-bug-report-50127/
Israeli hacking school trains cyber warriors
Posted on
DefenceTalkThree hooded hackers hunch over their computer screens in the control room at Israel’s new state-of-the-art “Cyber Gym”, where IT and infrastructure company employees train to defend against cyber attacks. The facility, a series of small buildings in the shadow of the looming Orot Rabin power station on Israel’s northern coastline, was inaugurated this month […]https://www.defencetalk.com/israeli-hacking-school-trains-cyber-warriors-49791/
DoD Beefs Up Contractor Information Security Requirements
Posted on
DefenceTalkAn amendment published yesterday to the Defense Federal Acquisition Supplement will require defense contractors to incorporate established information security standards on their unclassified networks and to report cyber-intrusion incidents that result in the loss of unclassified controlled technical information from these networks. The amendment will apply to all new contracts that will use or generate […]https://www.defencetalk.com/dod-beefs-up-contractor-information-security-requirements-49688/
The Global Cybersecurity Market 2013-2023
Posted on
DefenceTalkThis report is the result of an extensive market and company research covering the global cyber security industry. It provides detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry participants, analysis of the leading companies in the industry, and key news. Introduction and Landscape Why was […]https://www.defencetalk.com/the-global-cybersecurity-market-2013-2023-48680/