Latest stories

  • Lockheed Picks Anark Software to Produce 3D Technical Data Packages for Orion Spacecraft; Richard Smith Comments - top government contractors - best government contracting event
    in ,

    Lockheed Picks Anark Software to Produce 3D Technical Data Packages for Orion Spacecraft; Richard Smith Comments

    Lockheed Martin has selected an Anark-built software that works to generate technical data packages in three-dimensional PDF formats in support of the former“™s work on NASA“™s Orion spacecraft. Lockheed“™s space systems business will use Anark Core Server to produce and publish 3D PDF documents of design and engineering data stored in PTC‘s Windchill software for product data […] More

  • DLT: 'Blackhole' Kits Represent 28% of Web Threats - top government contractors - best government contracting event
    in

    DLT: 'Blackhole' Kits Represent 28% of Web Threats

    DLT Solutions is alerting all Internet users to a type of online threat that uses Java, Flash and PDF content to infect computers with a Trojan Horse. Blackhole exploit kits represent 28 percent of all Web threats, the company said, and the U.S. hosts close to a third of all blackhole kits worldwide. DLT calls blackhole […] More

  • Jailbreak Exploit for iPhone Targets PDF - top government contractors - best government contracting event
    in

    Jailbreak Exploit for iPhone Targets PDF

    Following the recent ruling by the Library of Congress’ Patent Office,  an app called JailbreakMe 2.0 has become available that enables users to jailbreak the iPhone and iPod touch. The app uses a PDF exploit for approximately 20 different combinations of hardware and software, according to security researchers at F-Secure. Charlie Miller of Independent Security […] More

  • Attacks Using PDF Exploits on the Rise - top government contractors - best government contracting event
    in

    Attacks Using PDF Exploits on the Rise

    When hackers look assemble their tools to carry out attacks, they often look to exploit commonly used platforms in an effort to increase the number of potential targets. This is why more hackers write viruses for PCs instead of Macs, since the majority of the world’s computer users utilize PCs. The same holds true for […] More

  • The Chinese Are Coming: Cyber Espionage Targets Government Contractors - top government contractors - best government contracting event
    in

    The Chinese Are Coming: Cyber Espionage Targets Government Contractors

    U.S. government networks are consistently probed for vulnerabilities by hackers and foreign intelligence agencies. The difficulty of attribution combined with the ease of access and decreased physical risk makes cyber espionage a favorite tool of more advanced intelligence services. Foreign governments seek information for U.S.-based networks for a variety of reasons, including intelligence gathering and […] More

ExecutiveBiz Logo

Receive Daily News Briefing And Event Updates Straight to Your Inbox