Blog Posts Tagged with "Espionage"

69dafe8b58066478aea48f3d0f384820

Senate Testimony: Cyber Security as a Strategic Concern

February 02, 2012 Added by:Headlines

Testimony offered before the Senate Select Committee on Intelligence included threats to cybersecurity, the third item addressed, signifying that intrusions by state-sponsored China and Russia and independent actors like Anonymous and Lulzsec continue to be a concern...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MSUpdater Trojan Smuggles Data as Windows Update Traffic

February 01, 2012 Added by:Headlines

"We don't have information about the people behind those attacks, however as all of them are targeting government-related organizations, it is highly reasonable to suspect that the attackers are high profile, maybe even a country..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Real Cyberwar: A Taxonomy

January 18, 2012 Added by:Infosec Island Admin

Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Hacker to Release Symantec's PCAnywhere Source Code

January 16, 2012 Added by:Anthony M. Freed

YamaTough, spokesperson for the hacktivist group “The Lords of Dharmaraja”, informed Infosec Island of plans to release source code for Symantec's PCAnywhere. The release is to be made prior to the threatened exposure of the full source code for the Norton antivirus...

Comments  (19)

6d117b57d55f63febe392e40a478011f

Exclusive: Interview With Hacker YamaTough

January 13, 2012 Added by:Anthony M. Freed

Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...

Comments  (3)

D551093f5d8af724e17929c91eb90d63

Espionage, Cyberwar and Trans-National Cybercrime

January 11, 2012 Added by:Andrea Zapparoli Manzoni

Cyber-espionage, especially from the far east, has reached never seen before levels of sophistication and is now the world's primary cause of intellectual property theft. Some analyst are already stating that we just entered a new “Cold Cyberwar” age...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Exclusive: Indian Intelligence Infiltrated US Government Networks

January 10, 2012 Added by:Anthony M. Freed

Infosec Island received sixty-eight sets of usernames and passwords for compromised US government network accounts which “The Lords of Dharmaraja” said were acquired from servers belonging to India’s Ministry of External affairs and the National Informatics Centre...

Comments  (29)

94ae16c30d35ee7345f3235dfb11113c

China’s Cyber Strategy – Too Much or Too Little?

January 10, 2012 Added by:Joel Harding

That the Chinese government seems to be systematically penetrating corporate and government system in order to steal corporate and government secrets is not really the issue. This appears to be an accepted fact, and the issue is how to address the problem...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Rim, Nokia and Apple Providing Government Back Doors

January 09, 2012 Added by:Pierluigi Paganini

Some Indian Military internal documents were found that refer to a surveillance project called RINOA SUR, which stands for RIM, Nokia and Apple. The project is related to a platform used to spy on the USCC - the US-China Economic and Security Review Commission...

Comments  (9)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense: Welcome to 2012 and Interesting Times

January 05, 2012 Added by:Cyber Defense Weekly

2011 was the year that state sponsored hacking finally came to national attention with hundreds of articles exposing the continued industrial and military cyber espionage credited to the likes of China and Russia. We can be sure that 2012 will bring more of the same...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Hack of U.S. Chamber Undetected for Six Months

December 22, 2011 Added by:Headlines

"What was unusual about it was that this was clearly somebody very sophisticated, who knew exactly who we are and who targeted specific people and used sophisticated tools to try to gather intelligence," said the Chamber's COO David Chavern...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

How Not to Recruit Spies Online and Off

December 21, 2011 Added by:Infosec Island Admin

One must look at the range and breadth of companies and entities being broken in to by the likes of China to see that no one is exempt. Know the ins and outs of the technology as well as the spook landscape, especially if you work in infosec today, lest you become the next target...

Comments  (2)

296634767383f056e82787fcb3b94864

Symantec Still Selling Huawei Equipment to the DoD

December 19, 2011 Added by:Jeffrey Carr

"In a letter to partners, North America channel chief Randy Cochran says the contract manufacturing relationship between Symantec and Huawei will remain unaffected, as will Symantec’s commitment to marketing and developing appliance-based solutions..."

Comments  (3)

94ae16c30d35ee7345f3235dfb11113c

Cyber Security and Illegal Information Operations

December 13, 2011 Added by:Joel Harding

The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Handful of Chinese Hackers Responsible for Majority of Attacks

December 12, 2011 Added by:Headlines

"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »