Items Tagged with "Espionage"


B64e021126c832bb29ec9fa988155eaf

The Need for a Special Forces Offensive Cyber Group

February 21, 2012 Added by:Dan Dieterle

Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Intelligence Committee Continues Probe into Chinese Telecoms

February 17, 2012 Added by:Headlines

Chairman Rogers initiated the probe last fall after a preliminary inquiry into Chinese espionage operations determined the need for further investigation into threats aimed at the U.S. technology supply chain, critical infrastructure, and proprietary information...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Nortel: From Bankruptcy to Industrial Espionage Victim

February 15, 2012 Added by:Pierluigi Paganini

The damage is incalculable if we consider the enormous amount of data that may have been lost. Information on technological solutions, business reports, and other sensitive documents were stolen for years, seriously compromising the intellectual property of the company...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Senate Testimony: Cyber Security as a Strategic Concern

February 02, 2012 Added by:Headlines

Testimony offered before the Senate Select Committee on Intelligence included threats to cybersecurity, the third item addressed, signifying that intrusions by state-sponsored China and Russia and independent actors like Anonymous and Lulzsec continue to be a concern...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MSUpdater Trojan Smuggles Data as Windows Update Traffic

February 01, 2012 Added by:Headlines

"We don't have information about the people behind those attacks, however as all of them are targeting government-related organizations, it is highly reasonable to suspect that the attackers are high profile, maybe even a country..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Real Cyberwar: A Taxonomy

January 18, 2012 Added by:Infosec Island Admin

Cyberwar should only be leveled as a term when the actual use of warfare if involved. Cyberwar, as yet, has NOT happened. There have been Cyber Operations if you want to use the term but most of what we have been seeing in the news cycle is once again, NOT cyberwar...

Comments  (2)

6d117b57d55f63febe392e40a478011f

Hacker to Release Symantec's PCAnywhere Source Code

January 16, 2012 Added by:Anthony M. Freed

YamaTough, spokesperson for the hacktivist group “The Lords of Dharmaraja”, informed Infosec Island of plans to release source code for Symantec's PCAnywhere. The release is to be made prior to the threatened exposure of the full source code for the Norton antivirus...

Comments  (19)

6d117b57d55f63febe392e40a478011f

Exclusive: Interview With Hacker YamaTough

January 13, 2012 Added by:Anthony M. Freed

Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...

Comments  (3)

D551093f5d8af724e17929c91eb90d63

Espionage, Cyberwar and Trans-National Cybercrime

January 11, 2012 Added by:Andrea Zapparoli Manzoni

Cyber-espionage, especially from the far east, has reached never seen before levels of sophistication and is now the world's primary cause of intellectual property theft. Some analyst are already stating that we just entered a new “Cold Cyberwar” age...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Exclusive: Indian Intelligence Infiltrated US Government Networks

January 10, 2012 Added by:Anthony M. Freed

Infosec Island received sixty-eight sets of usernames and passwords for compromised US government network accounts which “The Lords of Dharmaraja” said were acquired from servers belonging to India’s Ministry of External affairs and the National Informatics Centre...

Comments  (29)

94ae16c30d35ee7345f3235dfb11113c

China’s Cyber Strategy – Too Much or Too Little?

January 10, 2012 Added by:Joel Harding

That the Chinese government seems to be systematically penetrating corporate and government system in order to steal corporate and government secrets is not really the issue. This appears to be an accepted fact, and the issue is how to address the problem...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Rim, Nokia and Apple Providing Government Back Doors

January 09, 2012 Added by:Pierluigi Paganini

Some Indian Military internal documents were found that refer to a surveillance project called RINOA SUR, which stands for RIM, Nokia and Apple. The project is related to a platform used to spy on the USCC - the US-China Economic and Security Review Commission...

Comments  (9)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense: Welcome to 2012 and Interesting Times

January 05, 2012 Added by:Cyber Defense Weekly

2011 was the year that state sponsored hacking finally came to national attention with hundreds of articles exposing the continued industrial and military cyber espionage credited to the likes of China and Russia. We can be sure that 2012 will bring more of the same...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Hack of U.S. Chamber Undetected for Six Months

December 22, 2011 Added by:Headlines

"What was unusual about it was that this was clearly somebody very sophisticated, who knew exactly who we are and who targeted specific people and used sophisticated tools to try to gather intelligence," said the Chamber's COO David Chavern...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

How Not to Recruit Spies Online and Off

December 21, 2011 Added by:Infosec Island Admin

One must look at the range and breadth of companies and entities being broken in to by the likes of China to see that no one is exempt. Know the ins and outs of the technology as well as the spook landscape, especially if you work in infosec today, lest you become the next target...

Comments  (2)

Page « < 2 - 3 - 4 - 5 - 6 > »