hacking

Home / Tags

Recent Inquiries

UAS Tracking, Evasion, and CUAS Methods

DSIAC was asked to identify UAS tracking methods and/or systems, CUAS methods/systems, and UAS evasion methods/systems currently in use. DSIAC searched open sources for current technologies utilized in the civilian and military sectors to combat the rising…

Articles

Swamped by Cyberthreats, Citizens Need Government Protection

Most people can’t keep up with the latest in technology, which puts them at risk as cybercriminals exploit human and technical weaknesses. For example, William and Nancy Skog hoped to retire to a beautiful new home. Then a fraudster fooled them into transferring US$307,000 to his bank account. Their entire life savings disappeared in the

Limiting the Potential Abuse of Smartphone Sensors

With the increasing attention being paid to the internet of things security concerns by legislators at both the state and federal levels, it’s worth considering the implications of the connected sensors that we carry with us everywhere we go — those in our smartphones. Whether an agency has government-issued devices, official bring-your-own-device policies or a

Playing Nice? FireEye CEO Says U.S. Malware is More Restrained than Adversaries”

Malware used by the United States in offensive cyber-operations plays “nice” when compared to other nation-state malware, according to FireEye CEO Kevin Mandia. Speaking at the Cyber Threat Intelligence Forum produced by Scoop News Group on Thursday, Mandia said when FireEye analyzes malware from state-backed hackers, the company usually finds elements of public policy baked