Blog Posts Tagged with "Espionage"

924ce315203c17e05d9e04b59648a942

Creating an Effective Cyber Espionage Operation

March 15, 2011 Added by:Richard Stiennon

The tools and methods include the use of custom Trojans, back hacking, infiltration, exfiltration, recruitment, IP signal intelligence, seeding, and poisoning. But getting actionable intelligence into the right hands is the hardest task. This post proposes one such operational structure...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Cyber Warfare Semantics - Can't We All Just Get Along?

March 13, 2011 Added by:Don Eijndhoven

Cyber Warfare is a fringe area. Information Security is poorly understood by the mainstream populace, a fact well evidenced by the digital exhibitionism taking place on the various social networking sites. In fact, it is even poorly understood within the IT sector itself...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

How to Avoid Falling For Social Engineering Attacks

March 11, 2011 Added by:Brent Huston

You have to be sharp to see through a social engineering attack. The challenge is to retain that sharpness while in the midst of multiple tasks. Most of the time, the attacker will take advantage of a busy receptionist, a chaotic office, or tired staff when they try their dastardly deed...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

HBGary Federal Emails Reveal More Unreported Attacks

March 09, 2011 Added by:Headlines

Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Canadian Treasury and Finance Systems Hacked

February 19, 2011 Added by:Headlines

Attackers used targeted spear-phishing methods to gain access to executive's computers,then produced fraudulent emails that were sent out to numerous department staff. The emails contained attachments infected with malware that would harvest data and transmit the information to the attackers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Cyber Spies Target Government Systems

February 05, 2011 Added by:Headlines

British foreign secretary William Hague has issued statements confirming that government systems have been targeted by state-sponsored cyber espionage operations. Similar attempts to infiltrate government systems in the United States have also come to light...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Spies May Have Spear-fished U.S. Diplomats

February 02, 2011 Added by:Headlines

A series of emails were sent to five State Department officials who were engaged in sensitive negotiations with the Chinese government on greenhouse-gas emissions, and contained attachments infested with malware that would have allowed the attackers access to the recipient's computers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats: Big Enough to be Parodied on The Simpsons

January 25, 2011 Added by:Headlines

If you have been parodied on the long running prime-time animated series The Simpsons, you can rest assured that you have finally arrived. The most recent member of the coveted Simpson parody club is, believe it or not, none other than the Insider Threat...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Breaches By Infamous Insiders

January 07, 2011 Added by:Headlines

The insider threat to information security is an ever present and ever growing problem for the private and public sectors. Protecting against sensitive data loss events perpetrated by the very people entrusted with protecting the information is nearly a Sisyphean task...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bank of America Sets Up WikiLeaks Damage Control Team

January 03, 2011 Added by:Headlines

The Bank of America counter-espionage team includes consultants from the Booz Allen Hamilton, and is apparently focusing on details surrounding Bank of America's acquisitions of Merill Lynch and troubled lender Countrywide...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Chinese Hackers Lift Microsoft Windows Source Code

December 06, 2010 Added by:Headlines

A diplomatic memo from June of 2009 reveals that the Chinese security firm TOPSEC had access to the source code for Microsoft Windows and allowed the Chinese government to provided it to hackers in order to develop targeted attacks to exploit weaknesses in the operating system...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (013)

December 04, 2010 Added by:Christophe Veltsos

Who said: "Information security affects more organizations on more levels as technology permeates every functional area of a business and more staff members assume the role of knowledge worker..."?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Pursue State Sponsored Cyber Espionage

November 18, 2010 Added by:Headlines

Reports have asserted that the Chinese government is actively using Chinese telecom companies to conduct cyber espionage against the United States, and questions have been raised about partnerships with Chinese telecom companies and corporations tied to Governor-elect Rick Snyder of Michigan...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

USCC Report to Detail Chinese Cyber Espionage

November 16, 2010 Added by:Headlines

The U.S.-China Economic and Security Review Commission will release a report which is expected to detail the recent hijacking of 15% of worldwide internet traffic through Chinese telecom networks which contained data packets from the United States military, Executive Branch, and NASA...

Comments  (0)

B71b97ceae7b5837b59813ee06a34bed

The Gray Lines Between Reconnaissance, Espionage and Cyberwar

November 14, 2010 Added by:David Dennis

Since we currently have only a vague definition for a state of war, people will also have a hard time deciding what an act of war would look like in cyberspace. Defining basic terms only begins to scratch the surface, but attempting to make or implement policy without them is no shortcut...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »