Blog Posts Tagged with "Exfiltration"

B64e021126c832bb29ec9fa988155eaf

Chinese Hack Energy Company, Attack Pentagon, Try to Steal Stealth Bomber Skin

October 03, 2012 Added by:Dan Dieterle

China is well know for trying to steal military and scientific research, in an attempt to catch up on technology. How successful have they been? Just check out this cockpit comparison between China’s new Chengdu J-20 Stealth Fighter and the US F-22 Raptor...

Comments  (1)

94c7ac665bbf77879483b04272744424

Concerted Chinese Government Attacks or Just Another Day?

October 01, 2012 Added by:Marc Quibell

Front page news headlines today: "Chinese Hackers Breach White House!" For a split second there I was almost concerned; and then after reading I thought to myself...blah another false alarm. What did I expect?

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Shamoon Malware: Cyber Espionage Tool or Cyber Weapon

August 20, 2012 Added by:Pierluigi Paganini

Many hypotheses have been proposed, and some experts are convinced that Shamoon is a new state sponsored malware designed for cyber espionage that is also able to destroy the victims' device, perhaps to hide its operations by deleting evidence that can link the agents to the Command & Control servers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Translator Re-Sentenced for Possession of Classified Docs

August 06, 2012 Added by:Headlines

The defendant took classified documents from the U.S. Army without authorization. While assigned to an intelligence group in the 82nd Airborne Division of the U.S. Army at Al Taqqadam Air Base, he downloaded a classified electronic document and took hard copies of several other classified documents...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Mahdi Campaign and Cyber Espionage in the Middle East

July 19, 2012 Added by:Pierluigi Paganini

The Mahdi attack is based on two well known techniques used to deliver malicious payloads, and the huge quantity of data collected reveals the real targets of the operation are government agencies, critical infrastructure engineering firms and financial houses...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Counterpoint to F-Secure: Flame is Still Lame

June 18, 2012 Added by:J. Oquendo

I would like to believe that most governments have enough of a clue to avoid walking into a house like a Ninja only to bubble wrap their feet. History has shown us that they do. Does this make them innocent with regards to Flame or Stuxnet, not really, but yields more questions that don't quite add up...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iran Fingers US Hackers in Oil Ministry Attacks

June 12, 2012 Added by:Headlines

"Two American IPs were identified in the (cyber) attack against the oil ministry... The nature of the attack and the identity of the attackers have been discovered, but we cannot publicize it since we are still working on the case..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Warns Companies of Anonymous DDoS Attacks

May 25, 2012 Added by:Headlines

The Cyber Division of the FBI warned several large corporations of the potential for DDoS and data exfiltration attacks scheduled for today, May 25. The attacks are being coordinated by the rogue movement Anonymous in an an exercise termed "Operation NewSon"...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

A Field Guide to Post-UDID Unique IDs on iOS

May 10, 2012 Added by:Fergal Glynn

Ongoing developments in the device-wide ID space focus on two dueling schemes and codebases: OpenUDID and SecureUDID. If you’re an iOS developer, this will serve as an introduction to the details of these systems, including their limitations and potential for data leakage...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nissan Confirms Cyber Attack and Network Breach

April 25, 2012 Added by:Headlines

"We have detected an intrusion into our company's global information systems network... we believe that our systems are secure and that no customer, employee or program data has been compromised. However, we believe that user IDs and hashed passwords were transmitted..."

Comments  (0)

01ceb9281b3fb3dbb90c3efbe327717e

It's Not the Spam Email But What Lies Behind Them

March 15, 2012 Added by:Alan Woodward

The fact that such large proportion of home machines host unknown malware hides a bigger threat. By hijacking so many PCs it is possible to mount a massive probing operation that can seek out high value targets that are susceptible to classic hacking attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Jester's QR-Code Pwns Targets with WebKit Exploit

March 09, 2012 Added by:Headlines

The operation was intended to snare unsuspecting targets previously aggregated in a database. Those who scanned the QR-Code were then cross-referenced with known targets, and those targets were subsequently pwned, having their address books, texts and emails exfiltrated...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressional Testimony Reveals Security at NASA Lacking

March 02, 2012 Added by:Headlines

"In its fiscal year 2010 report to Congress on FISMA implementation, the OMB reported a Government-wide encryption rate for these devices of 54 percent. However, as of February 1, 2012, only 1 percent of NASA portable devices/laptops have been encrypted," Martin testified...

Comments  (0)

58bc13ef5da5ac4fc32d41c3fbc0e460

Lessons from the Nortel Networks Breach

February 16, 2012 Added by:Suzanne Widup

Much is being published about how inappropriate the response to the Nortel incident was, but it demonstrates an important point for companies - how do you know when you’ve done enough? How do you tell when an incident is over, and you should go back to business as usual?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

APT: What It Is and What It’s Not

February 10, 2012 Added by:Infosec Island Admin

They can use the most elegant of solutions and nimbly change their tactics, on the fly create/edit code to defeat the defender's tactics, and use the most simplistic of attacks in the effort to gain access KEEP it as long as possible to succeed in their own ends...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention Step 6: Encrypting Data at Rest

February 06, 2012 Added by:Rafal Los

Even if you did know where all your critical information is, you'd probably be powerless to control its sprawl. Let's face it, systems consume data and then become mobile - which is hardly something you can do anything about in a world where mobility is a key business driver...

Comments  (3)

Page « < 1 - 2 > »