Blog Posts Tagged with "Espionage"


The Danger of Mixing Cyber Espionage with Cyber Warfare

May 22, 2013 Added by:Jarno Limnéll

Cyber espionage does not equate with cyber warfare. Espionage may be carried out by multiple actors for manifold reasons. It does not automatically relate to warfare and plays only a minor part in the vast realm of war.

Comments  (6)


Pentagon Ups Cyber Espionage Accusations Against China

May 07, 2013 Added by:InfosecIsland News

A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber spying is focused on the US government, as well as American corporations.

Comments  (0)


National Security and Chinese Telecommunications Companies

October 14, 2012 Added by:Stefano Mele

Unfair trade practices of the Chinese telecommunications sector should be investigated by committees of jurisdiction in U.S. Congress and enforcement agencies in the Executive Branch. Particular attention should be paid to China’s continued financial support of key companies...

Comments  (0)


Chinese cyber attack against the White House

October 02, 2012 Added by:Plagiarist Paganini

The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...

Comments  (2)


PlaceRaider: 3D Visual Malware from Military Research

October 01, 2012 Added by:Plagiarist Paganini

It's known that military sector represents a privileged incubator for new technologies than in many cases are subsequently used in civil. We have already read about the existence of software to spy on victims that are able to record communications and movements but the Naval Surface Warfare Center in Crane, Indiana in collaboration with researchers at Indiana University created a new type of 'vi...

Comments  (0)


Crisis Malware Threatens Virtualized Environments

August 24, 2012 Added by:Plagiarist Paganini

Crisis Malware is an agent used to spy on victims by intercepting communications, and it is able to open a backdoor on the infected host once the user executes a JAR file made to look like an Adobe Flash Installer. The malware has been developed for several OSs, and a Mac version has been isolated...

Comments  (0)


Giving Aid and Comfort to the Enemy

August 16, 2012 Added by:

Why do the likes of McAfee, Symantec, TrendMicro, Microsoft and Bitdefender publish reverse engineering code examples and analysis on cyber espionage and sabotage tools which serve to delay, disrupt, deny, and deceive our enemies from developing nuclear weapons. This is giving aid and comfort to the enemy...

Comments  (11)


FinFisher: The Cyber Espionage Tool Found Everywhere

August 15, 2012 Added by:Plagiarist Paganini

FinFisher is a powerful cyber espionage agent developed by the Gamma Group that is able to secretly spy on a target's computers, intercepting communications, recording every keystroke and taking complete control of the host. The spyware was developed for law enforcement and government use...

Comments  (0)


Gauss Malware and Shadow Warfare

August 14, 2012 Added by:Joel Harding

The International Telegraph Union is the world’s telecommunication governing body. The United States is actively resisting them as the governing body. With Kaspersky’s Gauss discovery, the United States’ argument grows weaker. The US recognizes the advantage it has by having de facto control over the internet...

Comments  (0)


ICS-CERT: Gauss Information Stealing Malware

August 14, 2012 Added by:Infosec Island Admin

Kaspersky Lab recently released a report on a new information-stealing malware they have named “Gauss" which is designed to collect information and send the data to its command-and-control servers. Gauss was predominantly on systems in the Middle East, but has also been detected on networks in the US...

Comments  (0)


Gauss: Evidence of Ongoing Cyberwar and Espionage Campaigns

August 13, 2012 Added by:Plagiarist Paganini

Gauss collects network interface information, BIOS characteristics and computer drive details. Many ignore the aspect of modularity of the agent which may receive supplementary modules developed using the info acquired directly on the targets to conduct attacks against critical infrastructure...

Comments  (0)


Defcon Grows Up and Gets Recruited as an Asset

July 31, 2012 Added by:Infosec Island Admin

With the advent of Anonymous and Stuxnet and the nascent idea of the internet becoming a “digital nation state” we all have to be mindful that while the technologies out there are a commodity, so too are we in the great game of cold war intelligence and cyber war. We are the commodity that makes the new exploit...

Comments  (0)


On Government Strategies to Mitigate Growing Cyber Threats

July 16, 2012 Added by:Plagiarist Paganini

We have witnessed the recruitment of hackers on the part of governments to carry out offensive actions and to train personnel in the use of deadly new weapon... the keyboard. Not with bullets, but with bits we must now battle, and who better than a hacker can transfer their knowledge on the subject matter?

Comments  (0)


China Has Backdoor Access to Eighty-Percent of Communications

July 16, 2012 Added by:Headlines

Former Pentagon analyst F. Michael Maloof warns that the Chinese government has backdoor access to as much as eighty-percent of the worlds telecom traffic, giving the regime access to sensitive communications made possible by equipment from two Chinese based telecom giants - Huawei Technologies and ZTE...

Comments  (0)


Cyber Espionage and the Greatest Transfer of Wealth in History

July 10, 2012 Added by:Headlines

"Symantec placed the cost of IP theft to United States companies at $250 billion a year. Global cybercrime at $114 billion - nearly $388 billion when you factor in downtime. And McAfee estimates that $1 trillion was spent globally on remediation. And that's our future disappearing in front of us..."

Comments  (0)


Breach Alert: Putin Makes Drone Development a National Priority

June 19, 2012 Added by:Jeffrey Carr

Russia plans to spend US$13B on UAS development over the next eight years. Part of that technology development strategy is almost certainly going to be acquiring intellectual property on related technology from foreign firms. Two good examples of companies at risk are Boeing and General Atomics...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »