Blog Posts Tagged with "China"

69dafe8b58066478aea48f3d0f384820

WordPress DDoS Attacks Traced to China

March 07, 2011 Added by:Headlines

“Right now there are huge asymmetric risks on the internet because any bad actor, for a few tens of thousands of dollars, has the online equivalent of a dirty nuke and can bring even the largest sites to their knees and silence millions of voices..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Canadian Treasury and Finance Systems Hacked

February 19, 2011 Added by:Headlines

Attackers used targeted spear-phishing methods to gain access to executive's computers,then produced fraudulent emails that were sent out to numerous department staff. The emails contained attachments infected with malware that would harvest data and transmit the information to the attackers...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Strategic Industries Should Go On High Alert

February 11, 2011 Added by:Richard Stiennon

Adversaries using pernicious methodologies are targeting the data of globally strategic industries. Business as usual based on risk based methodologies have to be supplanted by an urgent revamping of security deployments to counter a frightening new level of threat...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Energy Companies Hit by Chinese "Night Dragon" Attacks

February 10, 2011 Added by:Headlines

"Targeted attacks such as Night Dragon, orchestrated by a growing group of malicious attackers committed to their targets, are rapidly on the rise. These targets have now moved beyond the defense industrial base, government, and military computers to include global corporate and commercial targets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Cyber Spies Target Government Systems

February 05, 2011 Added by:Headlines

British foreign secretary William Hague has issued statements confirming that government systems have been targeted by state-sponsored cyber espionage operations. Similar attempts to infiltrate government systems in the United States have also come to light...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Spies May Have Spear-fished U.S. Diplomats

February 02, 2011 Added by:Headlines

A series of emails were sent to five State Department officials who were engaged in sensitive negotiations with the Chinese government on greenhouse-gas emissions, and contained attachments infested with malware that would have allowed the attackers access to the recipient's computers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet Evidence Points to Joint US-Israeli Development

January 16, 2011 Added by:Headlines

Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China is Vulnerable to Widespread SCADA Exploit

January 11, 2011 Added by:Headlines

"I'm not sure whats worse, a 0day for the most popular SCADA software in China floating around in the wild or a team of security professionals from China's CERT sleeping behind the wheel..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Breaches By Infamous Insiders

January 07, 2011 Added by:Headlines

The insider threat to information security is an ever present and ever growing problem for the private and public sectors. Protecting against sensitive data loss events perpetrated by the very people entrusted with protecting the information is nearly a Sisyphean task...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacked Apple iTunes Accounts Offered for Sale

January 06, 2011 Added by:Headlines

China's biggest online retail website is offering hacked Apple iTunes store accounts for sale. The accounts contain detailed information including credit card numbers of the registered account owners, enabling purchasers of the breached accounts to buy music, movies, games and other products...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Security Events of 2010

December 27, 2010 Added by:Headlines

2010 has proved to be a most eventful year for the information security field. From the WikiLeaks "Cablegate" disclosures to Chinese state-sponsored hacking, the Stuxnet virus to Google's WIFI intrusions, 2010 will certainly be remembered as a benchmark year.

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stuxnet Virus Runs Rampant at Iranian Nuclear Facilities

December 15, 2010 Added by:Headlines

The highly sophisticated Stuxnet virus is running rampant at Iranian nuclear facilities. Researchers are basing their assessment of the level of infestation on the sharp and continued increase in internet traffic from Iran to websites dedicated to eradicating the virus...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researcher: Stuxnet Virus Probably "Made In China"

December 14, 2010 Added by:Headlines

Security expert Jeffrey Carr of Taia Global, who had previously proposed alternatives to the notion that the United States or Israel created the Stuxnet virus to target Iranian centrifuges, now strongly believes her has uncovered data that indicates the malware originated in China...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Hackers Lift Microsoft Windows Source Code

December 06, 2010 Added by:Headlines

A diplomatic memo from June of 2009 reveals that the Chinese security firm TOPSEC had access to the source code for Microsoft Windows and allowed the Chinese government to provided it to hackers in order to develop targeted attacks to exploit weaknesses in the operating system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Ex-Employee Stole Trade Secrets Worth Over $50M

November 24, 2010 Added by:Headlines

The theft of trade secrets has widespread consequences, as it causes companies to lose their competitive edge, can make it difficult to realize a return on billions of dollars worth of research and development efforts, and ultimately devalues shareholder value...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Bogus Chinese Processors Used in Missile Systems

November 23, 2010 Added by:Headlines

An administrator at VisionTech plead guilty to charges she assisted in selling sub-grade Chinese computer processors to DoD contractors for use in U.S. military weapons systems. Companies that bought the components include Northrop Grumman, Raytheon Missile Systems, and BAE Systems...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »