Items Tagged with "Espionage"
April 17, 2012 Added by:Dan Dieterle
“Using a person on the ground would greatly increase the probability of computer infection, as opposed to passively waiting for the software to spread through the computer facility. 'Iranian double agents' would have helped to target the most vulnerable spots in the system...”
April 10, 2012 Added by:Pierluigi Paganini
The U.S. Navy has reported that scope of the project is to hack into consoles to access to sensitive information exchanged through their messaging services. They have offered guarantees that the spying technology will be used only on nations overseas...
April 09, 2012 Added by:Pierluigi Paganini
China's growing presence in cyber space will result in an increase in cyber operations against the nation. Due to the imbalance between an aggressive cyber offense its weak cyber defense capabilities, it could be the origin of significant technological problems for China...
March 30, 2012
The exploitation of information technology (IT) products and services through the global supply chain is an emerging threat that could degrade the confidentiality, integrity, and availability of critical and sensitive agency networks and data...
March 28, 2012 Added by:Joel Harding
What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?
March 27, 2012 Added by:Pierluigi Paganini
While I understand the defensive approach, I believe that such behavior could have serious repercussions on the global market. In terms of security, little will change by breaking strategic alliances. Cyber attacks will continue and will increase in frequency and efficiency...
March 27, 2012 Added by:Jeffrey Carr
While the joint venture may be over, remember a lot of Huawei equipment has already been sold to the U.S. government including DOD and NASA through channel partners like MPAK and Dell Force 10 Networks. To make matters worse, no one is testing for backdoors in firmware updates...
March 19, 2012 Added by:Pierluigi Paganini
An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...
March 15, 2012 Added by:Jeffrey Carr
The U.S. will only begin to save its intellectual property from cyber thieves when corporate boards of directors force CEOs to inventory, segregate and monitor their critical data in real time which usually means re-architecting their entire network...
March 14, 2012 Added by:Headlines
"The payload is also an advanced persistent threat - extremely difficult to detect once inside the network. Although it’s more than a week old, the backdoor still has poor detection, with only 7 of 42 antivirus solutions able to detect it..."
March 13, 2012 Added by:Jeffrey Carr
The report did a good job exploring part of the Supply Chain problem with with chip development. It didn't cover the more common problem of U.S. companies who out-source development work to Chinese firms or companies like Dell who do their manufacturing and R&D in China...
March 08, 2012 Added by:Pierluigi Paganini
Computer fraud, phishing, and malware development designed to steal sensitive information from users, the use of advanced persistent threats, ramsonware, and cyber espionage are all activities united by the intent to profit from the improper use of technology...
March 08, 2012 Added by:Headlines
"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."
RSA was a veritable cornucopia of data collection. There were no firewalls, human IDS/IPS or content filtering at this show. People openly discussed strategic plans, engineering specs and tactical activities whether over morning coffee or late night shots of Patron...
March 05, 2012 Added by:Pierluigi Paganini
The internal investigation at NASA also revealed that almost none of the agency's portable devices are encrypted, and that at least one of the stolen laptops contained algorithms to command and control systems for the International Space Station...
March 04, 2012
Conclusions of the research and analysis indicate that there is a direct and quantifiable historical linkage between the People’s Republic of China and cyber warfare. This correlation is divided into three sectors as a nation state information warfare initiative...