Items Tagged with "Espionage"


B64e021126c832bb29ec9fa988155eaf

Iranian Double Agents Planted Stuxnet in Nuclear Facilities

April 17, 2012 Added by:Dan Dieterle

“Using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility. 'Iranian double agents' would have helped to target the most vulnerable spots in the system...”

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Governments and Gaming Platforms: It's Time for Warfare

April 10, 2012 Added by:Pierluigi Paganini

The U.S. Navy has reported that scope of the project is to hack into consoles to access to sensitive information exchanged through their messaging services. They have offered guarantees that the spying technology will be used only on nations overseas...

Comments  (11)

03b2ceb73723f8b53cd533e4fba898ee

China, Cyber Warfare and Challenges for the Future

April 09, 2012 Added by:Pierluigi Paganini

China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

GAO Report: IT Supply Chain Security Risks

March 30, 2012

The exploitation of information technology (IT) products and services through the global supply chain is an emerging threat that could degrade the confidentiality, integrity, and availability of critical and sensitive agency networks and data...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

Huawei Symantec: Fear of Chinese Espionage Ends Venture

March 27, 2012 Added by:Pierluigi Paganini

While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...

Comments  (0)

296634767383f056e82787fcb3b94864

The Real Reason Symantec Sold its Interest in Huawei Symantec

March 27, 2012 Added by:Jeffrey Carr

While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Pierluigi Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)

296634767383f056e82787fcb3b94864

Commerce Secretary Bryson Doesn't Understand Cyber Espionage

March 15, 2012 Added by:Jeffrey Carr

The U.S. will only begin to save its intellectual property from cyber thieves when corporate boards of directors force CEOs to inventory, segregate and monitor their critical data in real time which usually means re-architecting their entire network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Yet Another Chinese-Based Targeted Malware Attack

March 14, 2012 Added by:Headlines

"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."

Comments  (0)

296634767383f056e82787fcb3b94864

USCC Report on China Misses the Boat on Cyber Espionage

March 13, 2012 Added by:Jeffrey Carr

The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

New Opportunities for Cyber Espionage and Cyber Crime

March 08, 2012 Added by:Pierluigi Paganini

Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

On Hacking Humans at the RSA Conference

March 06, 2012 Added by:

RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

NASA Unprepared for Cyber Attacks

March 05, 2012 Added by:Pierluigi Paganini

The internal investigation at NASA also revealed that almost none of the agency's portable devices are encrypted, and that at least one of the stolen laptops contained algorithms to command and control systems for the International Space Station...

Comments  (0)

F2876df2ad8d7e06cf5e558f74049bdd

The Chinese Government and PLA’s Use of Information Warfare

March 04, 2012

Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...

Comments  (3)

Page « < 1 - 2 - 3 - 4 - 5 > »