Latest stories

  • Report: University Of Texas Researchers Remotely Hijack Drone - top government contractors - best government contracting event
    in

    Report: University Of Texas Researchers Remotely Hijack Drone

    In February, Congress ordered the Federal Aviation Administration to come up with new rules for integrating drones into U.S. airspace by 2015. According to a Fox News article, the plan could eventually see police drones watching over U.S. cities, UAVs monitoring transmission lines for power companies or cargo-plane sized drones guided by GPS as they […] More

  • Industry Group Agrees to Cyber Tactics for Botnets, Hijacking - top government contractors - best government contracting event
    in

    Industry Group Agrees to Cyber Tactics for Botnets, Hijacking

    An industry advisory group has voluntarily taken on suggested tactics to defend networks against three major cybersecurity threat areas, the Federal Communication Commission announced Thursday.  The Communications, Security, Reliability and Interoperability Council agreed to a set of recommendations it says would aid to mitigate the amount of Internet route hijackings, attacks on domain name systems and botnets. […] More

  • Hackers Hijack Fox Affiliates' Twitter, LinkedIn Accounts - top government contractors - best government contracting event
    in

    Hackers Hijack Fox Affiliates' Twitter, LinkedIn Accounts

    Hackers have gained access to a database of fox.com email accounts and took over the Twitter accounts of two Fox-affiliates Monday night, Mediabistro’s TVSpy reports. The hackers, who called themselves Lulz Security, posted tweets under the accounts of WFQX in Michigan and KADN in Louisiana. Using its own Twitter account, Lulz Security yesterday began teasing […] More

  • DARPA Wants to Circumvent Blocklists, Deep Packet Inspection - top government contractors - best government contracting event
    in

    DARPA Wants to Circumvent Blocklists, Deep Packet Inspection

    DARPA is looking to develop new technology to circumvent “techniques that suppress, localize, and/or corrupt information.” Called Safer Warfighter Communications (SAFER), the technology “will enable safe, resilient communications over the Internet, particularly in situations in which a third-party is attempting to discover the identity or location of the end users, or block the communication.” Specifically, […] More

ExecutiveBiz Logo

Receive Daily News Briefing And Event Updates Straight to Your Inbox