How the U.S. Government Defeated the Iranian Nuclear Program

In 2010 mysterious forces a created computer virus known as the Stuxnet virus to target Iran’s nuclear weapons program. The virus entered the plant through an infected USB device and set the Iranian nuclear program back several years.

Check out the animated video above to learn more.

Continue Reading →
Deprecated: Function get_currentuserinfo is deprecated since version 4.5.0! Use wp_get_current_user() instead. in /home/charge9/public_html/wp-includes/functions.php on line 5379
0

U.S. White House Purchases Juice-Jack Defenders to Protect Data and Networks

The White House recently completed the purchase of 1,600 Juice-Jack Defenders® for its employees to protect their data, identities, and networks. After an extensive “bake off” in which White House technical experts tested numerous charge-only/fast-charge adapters, it selected ChargeDefense’s Juice Jack Defender.

Stuart McCafferty, ChargeDefense’s President and CEO stated, “As a veteran-owned company, we are proud to be responsible for helping to protect our nation’s critical information, networks, and employees from cyber criminals. We applaud the White House for understanding the ...

Continue Reading →
Deprecated: Function get_currentuserinfo is deprecated since version 4.5.0! Use wp_get_current_user() instead. in /home/charge9/public_html/wp-includes/functions.php on line 5379
0

Happy Customer Share Kicks Off Our Week

Nothing gets the ChargeDefense team motivated and charged up on a Monday morning than receiving a note from a happy customer.

MistyLou in Alabama shared this great photo from a really productive weekend and said

fishing_solar


Continue Reading →
Deprecated: Function get_currentuserinfo is deprecated since version 4.5.0! Use wp_get_current_user() instead. in /home/charge9/public_html/wp-includes/functions.php on line 5379
0

Juice-Jacking Facts

DEFINITION:  The illegal hacking of a mobile device while attached to a USB port.

Identified by Black Hat in 2013 as the #1 threat for identity theft and malware for mobile device users.

REAL LIFE EXAMPLES:

  • Wirelurker – a Trojan horse that affected 100’s of thousands of Apple iOS devices. The Trojan was installed when users downloaded a popular gaming app from a Chinese third party app supplier and was loaded onto personal computers.  The malware then spread ...
Continue Reading →
Deprecated: Function get_currentuserinfo is deprecated since version 4.5.0! Use wp_get_current_user() instead. in /home/charge9/public_html/wp-includes/functions.php on line 5379
0
Page 1 of 3 123