website statistics
Job posting trends show that the US defense contractors are out for hiring black hat hackers.

What new Apple device you are getting?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)

Earlier today, I wrote about Mikko Hypponen’s, chief research officer of F-Secure, hypothesis of government spies infiltrating Microsoft. But he has something more to say. Lately, Mr. Hypponen has spent a lot of time looking at job openings of US defense contractors’ websites and online job listings to find out actual candidates with secret clearances who has been searched job to use specific keyword like “exploit”, “offensive”, and “vulnerability”. What he has seen over the last couple of months is pretty interesting. Job posting trends show that the US defense contractors are out for hiring offensive hackers, and they don’t only intend to protect US cyberspace but also intend to exploit the loopholes of cyber security.

Pentagon Contractors Post Openings For Black-Hat Hackers, Image Credit:

Mr. Hypponen has drawn our attention to job descriptions at multiple openings. One job listing for “Cyber Software Engineer” at defense firm Northrop Grumman reads, “this exciting and fast-paced Research and Development project will plan, execute, and assess an Offensive Cyberspace Operation (OCO) mission.” Another firm Booz Allen Hamilton seeks a “Target Digital Network Analyst” capable of “exploit development for personal computer and mobile device operating systems, including Android, Blackberry, iPhone and iPad.”

Defense contractor giant Raytheon is seeking for a “Unix Attack developer.” TeleCommunications Systems wants a “Windows Attack/Exploit Developer.” NSA contractor SAIC seeks a “Red Team Developer.” All three of those companies’ job descriptions include the phrase: “analyzing software for vulnerabilities as well as development of exploit code.”

Hypponen said “I think this is new, the arms race has started, and this proves it. It’s a clear sign of the demand to stockpile cyber weapons and expand the operations underway.” Recent reports also suggests that Hypponen could be right.

Source: Forbes

Buy Cheapest Related Product From

Facebook Concedes To Privacy Violation Charges, Agrees To Pay $10 Million

Carat – Battery Management App For iOS [Free]
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On June 17, 2012(3 years, 3 months ago.)

You May Also Like:

Recent Products

Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  
Buy Now | Compare  

What Do You Think?

Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.

Recent Search

Recent Tutorials

Now you can set custom ringtones to individual skype contacts on android. It's easy to setup. Take a look.
Now you can install Microsoft's Cortana on Android devices. It's pretty easy to install. Follow the steps below, check the screenshot.
Want to install Android lollipop 5.0.2 on pc? This post is for you. It's pretty easy to install and run. Just take a look.
With our partnership with Mode Media, we just got a jump start. Here is our first story of hand picked curated content on Android Tutorials.
Want to change theme on android ? We will show you how to change theme on android. It will makes your phone looks like new and smart.
You can record your screen on android very easily. No root Required. All you have to need a pc and USB cable. Let's find out.
A simple tutorial on how-to block a phone number on Android device, without an external app. Its pretty easy and straight-forward. Take a look.
Here we will show how to take Screenshot on your Apple Watch.
For too many people, the realization that they need to back up their photos and videos only comes when they misplace or break their smartphones and lose everything. Here we a report on possible solution and best tools.
Not sure if you are aware that your Wi-Fi Router Or Modem could be hacked too. Here we found a quick tips, how to check if your Router or Modem is hacked.
Close You Have To Login
Login With »Login With TwitterLogin With Facebook