information

Huzlers Fake news & Satire: The world should know better

You can not have missed it, the satire website that has gone viral, Huzler.com is a website that

Kratos Receives Contract Award in Support of MALD(R) Program

SAN DIEGO, Sept. 26, 2012 (GLOBE NEWSWIRE) -- Kratos Defense & Security Solutions, Inc. (Nasdaq:KTOS), a leading National Security Solutions provider, announced today that its recently acquired business, Composite Engineering, Inc. (CEI), has been awarded a contract for an additional forty five (45) Miniature Air Launched Decoy (MALD®)-J fuselages. The follow-on award is tied to a Lot 4 production contract that CEI received in July of 2011. To date, CEI has provided in excess of five hundred (500) MALD® fuselages to Raytheon Missile Systems, the Prime Contractor for the MALD® program. In addition to producing the MALD® fuselage, CEI provides target drones that are made from composite materials and are designed to replicate some of the most lethal threats facing this nation's Warfighters and strategic assets.

 

A World Without War

This report, compiled by Dr. Thomas P.M.

The 10 Most Infamous Student Hackers of All Time

Hacking has always been inherently a young person’s game.

Disinformation: How It Works

 There was a time, not too long ago (relatively speaking), that governments and the groups o

Reuters blogging platform hacked, the critical role of information

In this day my blog has dedicated a great attention to the security of social media, explaining the importance of new communication networks. Today the information is synonymous with power, due this consideration is critical develop the proper processes for its management.

To acquire information today we infiltrate social networks, we attack forums and social media platform to intimidate the adversary, we develop powerful too for the global surveillance. The information represents the gold of our time, a treasure that must be preserved against any kind of attacks.

 

EXCLUSIVE: The real face of Big Brother by Anonymous [1080p video]

The information security is developing multiple social media trackers and open source intelligenc

Is CISPA A Government Trojan Horse?

U.S.

Military leaders seek higher profile for Pentagon’s Cyber Command unit

Senior military leaders are recommending that the Pentagon’s two-year-old cyberwarfare uni

Penetration Testing: Real World Penetration Testing

Daniel Compton, Information Security Consultant of 7Safe, took the audience through a demonstrat

Pages