Press release
Submit a press release here.
How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
DDoS Attacks
Posts Tagged ‘Pentagon’
Most Recent
Read More
August 31, 2016

Pentagon: US Should Embrace Artificial Intelligence or Repeat Past Mistakes

A new study released by the Defense Science Board on autonomy has found that if the U.S. does not learn from past mistakes in cyber and electronic warfare, it could make the same with artificial intelligence technology.

The 121-page study, Autonomy [PDF], found that while the Department of Defense (DoD) is already embracing the value of autonomous capabilities it had yet to familiarize its enterprise processes to effectively support the rapid and widespread adoption warranted by the potential benefits, in addition to the potential threats autonomy could play in the hands of enemies.

The study stated that:

Autonomy will deliver substantial operational value – in [...]

Read More
March 4, 2016

DoD Invites Hackers to Hack the Pentagon

The Department of Defense has announced that it will invite hackers to test the cybersecurity infrastructure of the Pentagon in a bug bounty program – the first ever in the history of the federal government.

A pilot program by the Department of Defense will see ‘vetted’ hackers test their hacking prowess on the department’s public webpages to look for vulnerabilities. The bug bounty program will use commercial sector crowdsourcing platforms for the endeavor, according to a press release by the Department of Defense.

Participants in the bug bounty program will have to be registered and willingly submit to a background check prior to taking any part in the program. [...]

Read More
September 21, 2015

Pentagon’s new Cyber Security Tool: Cyber Scorecard

As reported by Reuters, Pentagon is building a huge electronic system for the purpose of providing intel about vulnerabilities in computer networks, installations, and weapons systems of the military. It is a step to help officials devise better strategies to fix them and comes in the wake of continued cyber-attacks from China and Russia. 

Cyber-attacks have become increasingly frequent in the age of computers and the Internet. When used to manipulate and tweak the weapons systems of other countries, they can prove to be devastating as they can lead to severe loss of life and property.

Keeping this ever-present threat in mind, the Pentagon is building a cyber [...]

Read More
August 7, 2015

From Russia With Love: Russians Suspected in Pentagon Breach

Russian hackers are suspected of infiltrating an unclassified e-mail system used by employees of the Joint Chiefs of Staff at the Pentagon.

An electronic intrusion by means of a cyber-attack against the Pentagon’s Joint Chiefs of Staff’s unclassified email system has resulted in the shutting down of the email system and computer network for nearly two weeks, US military officials told the Washington Post.

The “sophisticated cyber intrusion” was first detected on July 25 and has affected nearly 4,000 military and civilian employees and personnel working for the Joint Chiefs of Staff. Upon detection, the Pentagon immediately disabled the email system and the network still [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University