U.S. Launched Cyber Attacks on Iran After Drone Shootdown

SecurityWeek news and information

U.S. Launched Cyber Attacks on Iran After Drone Shootdown | #TpromoCom #Cyber #Hacker #Drone | U.S. military cyber forces launched a strike against Iranian military computers that crippled computers used to control rocket and missile launches, U.S. officials said Saturday.

US President Donald Trump is said to have secretly authorized US Cyber Command to carry out a retaliatory cyber attack on Iran in response to Iran’s downing of a U.S. surveillance drone.

The action by U.S. Cyber Command was a demonstration of the U.S.’s increasingly mature cyber military capabilities and its more aggressive cyber strategy under the Trump administration.

Read the Full Security Story: click here.

NTC, the most recognized name in training for the fire protection and low-voltage industry.
Please follow and like us:
error

Border & Maritime security to grow two-fold by 2028

#Border & #Maritime #security to grow two-fold by 2028 | #TpromoCom #Trending | Global instability due to terrorism and civil disruptions is leading to increased pressures among border and maritime security agencies to keep their borders safe from human, drugs, and weapons trafficking while streamlining operations to process genuine travellers.

According to Frost & Sullivan’s recent analysis, Global Border and Maritime Security Market, a high impetus on cross-border data sharing and integrated security systems is driving the need for technological solutions that act as force multipliers. Frost & Sullivan forecasts the market to grow two-fold from $19.22 billion in 2018 to reach $35.23 billion in 2028 at 6 percent CAGR.

“The adoption and integration of next-generation systems and technologies powered by artificial intelligence and real-time big data analytics will enable faster and more accurate threat detection, tracking, and decision making,” said Aravind Srimoolanathan, Senior Research Analyst, Security at Frost & Sullivan. “Robust network infrastructure and cyber security capabilities will be required with increasing inter-agency collaboration and cross-border data sharing.”

From a technology standpoint, Srimoolanathan predicts that multimodal biometrics for seamless security processing of travellers, tracking and identification through video analytics, and the concept of smart border management will gain prominence. Security industry consolidation and merger and acquisition activities with start-ups, which provide innovative solutions for the border security market, are also highly likely.

To read the remainder of this news article, click here.

TpromoCom [image]
Need help with a new website, blog, or social media outreach program? Call TpromoCom at 330-956-9003 for help.
Please follow and like us:
error

DoS Attack Blamed for U.S. Grid Disruptions

SecurityWeek news and information

#DoS Attack Blamed for U.S. #Grid Disruptions | #TpromoCom #Power #CyberSecurity #Hackers | According to the National Energy Technology Laboratory’s OE-417 Electric Emergency and Disturbance Report for the first quarter of 2019, a cyber event caused “interruptions of electrical system operations.”

The report shows that the incident impacted an unidentified utility in the region overseen by the Western Electricity Coordinating Council (WECC), which is responsible for compliance monitoring and enforcement in the Western Interconnection, and affected California (Kern County and Los Angeles County), Utah (Salt Lake County) and Wyoming (Converse County).

However, the report shows that the incident did not result in any power outages. The cyber event occured on March 5 — it started at 9:12 AM and systems were restored by 6:57 PM on the same day.

To read the remainder of this news article, click here.

[image] TpromoCom provides affordable websites & blogs.
TpromoCom provides affordable websites & blogs. Call 330-956-9003, or click on banner.
Please follow and like us:
error

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G

A New Consensus Is Emerging On How to Handle The Risk from China’s 5G | #TpromoCom #China #Spy #5G | Chinese telecom tech is invading the physical world, but Europeans and industry have strategies to contain the threat.

“No one calls it an intelligence risk, but national security agencies across the world are concerned about China’s 5G modems and other devices,” says Al Colombo, Senior Design Specialist with TpromoCom of Canton, Ohio.

Much of the Western intelligence debate around Chinese high-speed 5G technology has focused on hardware and software. Once the hardware is already out in the wild — which most think is inevitable — the future of the fight is in managing risk. It’s doable, if not yet widely advertised, according to several experts speaking at a U.S. intelligence conference this week, by quarantining Chinese equipment and deploying smarter electromagnetic spectrum management tools to better handle threats.

Bottom line: Huawei leads the world in the ability to rapidly produce cheap telecom hardware (as well as the underlying software.) Recent reports, including one from NATO, state it plainly. It’s one reason why European countries, including U.S. allies like Germany and the U.K., have been reluctant to ban tech from Huawei outright, even in the face of heavy U.S. pressure.

To read the remainder of this extremely interesting and timely news article, click here.

Please follow and like us:
error

Ex-NSA Contractor Pleads Guilty to 20-Year-Long Theft of Classified Data

Ex-NSA Contractor Pleads Guilty to 20-Year-Long Theft of Classified Data | #TpromoCom #NSA #Government #Guilty | The theft was labeled as the largest heist of classified government material in America’s history.

Harold Thomas Martin III, a 54-year-old Navy veteran from Glen Burnie, abused his top-secret security clearances to stole at least 50 terabytes of classified national defense data from government computers over two decades while working for a number of NSA departments between 1996 and 2016.

In August 2016, the FBI arrested Martin at his Maryland home and found “six full bankers’ boxes” worth of documents, many of which were marked “Secret” and “Top Secret,” in his home and car.

To read the remainder of this news article, click here.

[image] TpromoCom is a social media and web content company. Call or email us at tpromo@mail.com.
TpromoCom is a social media and web content company.
Call 330-956-9003 or email us at tpromo@mail.com.
Please follow and like us:
error

Chinese Hackers Target 27 Universities to Acquire Military Technology


Chinese Hackers Target 27 Universities to Acquire Military Technology | #TpromoCom #China #Hacker #Hackers | Over two dozen universities in the U.S. and around the world have been singled out for access to maritime military research. (please scroll for more)

Dozens of universities have fallen victim to a cyberattack conducted by Chinese hackers attempting to steal information on military technology.

The University of Washington, the University of Hawaii and the Massachusetts Institute of Technology (MIT) are among at least 27 universities that have been targeted, reports ZD Net.

To read the remainder of this news article, click here.

[divider (image)]
Security company owners, operations managers, and sales managers are invited to join The Coaching Forum on Facebook!
Please follow and like us:
error

U.S. Homeland Security watchdog still mulling review of Sharif case

U.S. Homeland Security watchdog still mulling review of Sharif case | #TpromoCom #DHS #Federal #OIG | The U.S. Department of Homeland Security’s government watchdog says it is still deciding whether to review the case of a man accused of committing a vehicle attack in Edmonton years after he crossed the U.S.-Mexico border.


A police officer’s hat lies on the ground following a vehicle and knife attack on an officer outside an Edmonton Eskimos game on Sept. 30, 2017. Republicans in the U.S. have asked the Department of Homeland Security’s watchdog agency to investigate how the accused in the attacks was able to make his way to Canada after being released from immigration detention at the U.S.-Mexico border. IAN KUCERAK/ POSTMEDIA, FILE

Late last year, Republicans on the House Committee on Oversight and Government Reform asked the Department of Homeland Security’s Office of Inspector General (OIG) to review the case of Abdulahi Hasan Sharif.

Sharif is accused of committing two vehicle attacks in Edmonton on Sept. 30, 2017, injuring a police officer and four civilians. To read the remainder of this news story, click here.

[image] TpromoCom provides affordable websites & blogs.
TpromoCom provides affordable websites & blogs 4 those with something to say, sell, or share. Stop by and see our new website at www.Tpromo.com.

Please follow and like us:
error

DHS to shift guest-worker program to reward higher-skilled foreigners

DHS to shift guest-worker program to reward higher-skilled foreigners | #TpromoCom #DHS #Employment #Government | The H-1B program is supposed to allow workers of high merit a chance to fill jobs in the U.S., but critics say it’s become a pipeline for siphoning cheap computer programmers from Asia into the U.S., where they often replace American workers.

Currently the U.S. allows 20,000 new H-1B visas a year to workers with a master’s degree or higher from an American school, and another 65,000 workers in a general category. When there’s a flood of applicants, the government holds a lottery to decide who gets the visas.

To read the remainder of this news article, click here.

Please follow and like us:
error