Latest stories

  • DLT: 'Blackhole' Kits Represent 28% of Web Threats - top government contractors - best government contracting event
    in

    DLT: 'Blackhole' Kits Represent 28% of Web Threats

    DLT Solutions is alerting all Internet users to a type of online threat that uses Java, Flash and PDF content to infect computers with a Trojan Horse. Blackhole exploit kits represent 28 percent of all Web threats, the company said, and the U.S. hosts close to a third of all blackhole kits worldwide. DLT calls blackhole […] More

  • AF Seeking 'Destroy or Disrupt' Cyber Tech - top government contractors - best government contracting event
    in

    AF Seeking 'Destroy or Disrupt' Cyber Tech

    The U.S. Air Force has issued a solicitation notice for offensive cyber technologies that can destroy or disrupt the ability of cyber attackers to access networks, Wired reports. Citing official documents, Noah Shachtman reports the Air Force also wants the technologies to deny, degrade, deceive, corrupt or usurp hackers’ abilities to use cyberspace domains to their […] More

  • Trojan Horse Virus Targeting Govt, Infrastructure Personnel In Iran, Israel - top government contractors - best government contracting event
    in

    Trojan Horse Virus Targeting Govt, Infrastructure Personnel In Iran, Israel

    Seculert and Kasperksy Lab found a Trojan horse virus is infecting computers and stealing data from high-profile individuals in Israel, Iran and other countries in the Middle East. According to CNN Security Clearance,Seculert Chief Technology Officer Aviv Raff said that whoever coded the still-active virus was fluent in Farsi and that some of the stolen […] More

  • Cyber Jargon YOU Need To Know - top government contractors - best government contracting event
    in

    Cyber Jargon YOU Need To Know

    As the use of the internet and technology grows, so do its terms and definitions. Here is a rundown of today’s most frequently used cyber terms. We left something out? Please feel free to leave a comment below to further enhance our ‘cyber jargon’ glossary. Authentication: Confirms that a computer program or individual attempting to […] More

ExecutiveBiz Logo

Receive Daily News Briefing And Event Updates Straight to Your Inbox