Blog Posts Tagged with "Espionage"

03b2ceb73723f8b53cd533e4fba898ee

Governments and Gaming Platforms: It's Time for Warfare

April 10, 2012 Added by:Pierluigi Paganini

The U.S. Navy has reported that scope of the project is to hack into consoles to access to sensitive information exchanged through their messaging services. They have offered guarantees that the spying technology will be used only on nations overseas...

Comments  (11)

03b2ceb73723f8b53cd533e4fba898ee

China, Cyber Warfare and Challenges for the Future

April 09, 2012 Added by:Pierluigi Paganini

China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Huawei Symantec: Fear of Chinese Espionage Ends Venture

March 27, 2012 Added by:Pierluigi Paganini

While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...

Comments  (0)

296634767383f056e82787fcb3b94864

The Real Reason Symantec Sold its Interest in Huawei Symantec

March 27, 2012 Added by:Jeffrey Carr

While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Pierluigi Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)

296634767383f056e82787fcb3b94864

Commerce Secretary Bryson Doesn't Understand Cyber Espionage

March 15, 2012 Added by:Jeffrey Carr

The U.S. will only begin to save its intellectual property from cyber thieves when corporate boards of directors force CEOs to inventory, segregate and monitor their critical data in real time which usually means re-architecting their entire network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Yet Another Chinese-Based Targeted Malware Attack

March 14, 2012 Added by:Headlines

"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."

Comments  (0)

296634767383f056e82787fcb3b94864

USCC Report on China Misses the Boat on Cyber Espionage

March 13, 2012 Added by:Jeffrey Carr

The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

New Opportunities for Cyber Espionage and Cyber Crime

March 08, 2012 Added by:Pierluigi Paganini

Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

On Hacking Humans at the RSA Conference

March 06, 2012 Added by:

RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

NASA Unprepared for Cyber Attacks

March 05, 2012 Added by:Pierluigi Paganini

The internal investigation at NASA also revealed that almost none of the agency's portable devices are encrypted, and that at least one of the stolen laptops contained algorithms to command and control systems for the International Space Station...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

The Need for a Special Forces Offensive Cyber Group

February 21, 2012 Added by:Dan Dieterle

Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Intelligence Committee Continues Probe into Chinese Telecoms

February 17, 2012 Added by:Headlines

Chairman Rogers initiated the probe last fall after a preliminary inquiry into Chinese espionage operations determined the need for further investigation into threats aimed at the U.S. technology supply chain, critical infrastructure, and proprietary information...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Nortel: From Bankruptcy to Industrial Espionage Victim

February 15, 2012 Added by:Pierluigi Paganini

The damage is incalculable if we consider the enormous amount of data that may have been lost. Information on technological solutions, business reports, and other sensitive documents were stolen for years, seriously compromising the intellectual property of the company...

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »