Archive for the ‘DOD’ Category

June 28, 2017 – Hack Naked News #131

June 30th, 2017

DoD networks have been compromised, the Shadow Brokers continue their exploits, a Pennsylvania healthcare system gets hit with Petya, and more. Jason Wood of Paladin Security joins us to discuss nations’ offensive technical strengths and defensive weaknesses on this episode of Hack Naked News! Doug’s Stories: — Shadowbrokers continue their exploits by planning to dox […]

The post June 28, 2017 – Hack Naked News #131 appeared first on Security Weekly.

Posted in DOD, Hack Naked News, healthcare, Jason Wood, Paladin Security, Pennsylvania, Petya, shadow brokers | Comments (0)

Report: Feds Mull Bug Bounty Contest for Medical Devices

June 27th, 2016

In-brief: Following the success of the Hack the Pentagon bug bounty program, officials at the U.S. Department of Health and Human Services are considering launching a similar program aimed at medical devices and other healthcare systems.  If imitation is the sincerest form of flattery, then the U.S. Department of Defense should be feeling pretty good about its recently announced “Hack the Pentagon” bug bounty program. Just a few months after the DOD unveiled a bug bounty program that provided financial incentives to security researchers and “white hat” hackers to have at its networks, the Chief Privacy Officer at the Department of Health and Human Services (HHS) has made public statements that suggest HHS is considering a similar program. From the article, over at Federal Times: HHS officials mentioned the DoD’s recently completed pilot program—which paid bounties to hackers who were able to discover cyber vulnerabilities at the agency, also known as ethical hacking—as […]

Definitive Guide to DLP

Posted in bounty, Breaking Security News, Bugcrowd, DOD, Embedded, Government, HackerOne, healthcare, HHS, medical devices, medicine, software development, Top Stories, vulnerabilities | Comments (0)

“Hack the Pentagon” bug bounty program announced

March 7th, 2016

First, we vet you, the US says. Then, keep your hands where we can see them. Now we’re just like the cool tech companies!

Posted in bug bounty, Bug Bounty Program, DOD, Hack the Pentagon, Law & order, Security threats, US Department of Defense, Vulnerability | Comments (0)