Items Tagged with "Espionage"


296634767383f056e82787fcb3b94864

Symantec Still Selling Huawei Equipment to the DoD

December 19, 2011 Added by:Jeffrey Carr

"In a letter to partners, North America channel chief Randy Cochran says the contract manufacturing relationship between Symantec and Huawei will remain unaffected, as will Symantec’s commitment to marketing and developing appliance-based solutions..."

Comments  (3)

94ae16c30d35ee7345f3235dfb11113c

Cyber Security and Illegal Information Operations

December 13, 2011 Added by:Joel Harding

The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Handful of Chinese Hackers Responsible for Majority of Attacks

December 12, 2011 Added by:Headlines

"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Military Chief Warns of Economic Cyber Threat

December 01, 2011 Added by:Headlines

"We lose enormous intellectual property rights. We're under constant attack every day. And it's going to take a whole government approach," said General Martin Dempsey, Chairman of the Joint Chiefs of Staff...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Espionage: Protecting American Innovation in Cyberspace

November 23, 2011 Added by:Headlines

"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report Details China's Electronic Espionage Apparatus

November 22, 2011 Added by:Headlines

"In Senate testimony in 2011, Director of National Intelligence James Clapper outlined concerns about Chinese cyber surveillance, highlighting that the ―Chinese have made a substantial investment in this area, they have a very large organization devoted to it and they‘re pretty aggressive..."

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Chinese Intelligence and Cyber Reconnaissance Infrastructure

November 18, 2011 Added by:Stefano Mele

Governments, businesses, military, all rely on communications. Moreover, information collected and collated from intercepted diplomatic, military, commercial and financial communications offers potential competitors an advantage on the negotiation table or battlefield...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

China’s Cyberwarfare Capabilities are Rudimentary???

November 07, 2011 Added by:Infosec Island Admin

Patching, and secure coding have not been at the fore here and thus it is trivial for the most part to hack into systems throughout the internet. So, the Chinese need not be uber haxx0rs to do the damage needed because we collectively have done a bad job at securing our own networks...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Cyber Espionage Report Fingers China and Russia

November 03, 2011 Added by:Headlines

"Cyberspace makes it possible for foreign collectors to gather enormous quantities of information quickly and with little risk, whether via remote exploitation of victims' computer networks, downloads of data to external media devices, or e-mail messages transmitting sensitive information..."

Comments  (0)

29cf3ef0a3104bccc62f3387739c1ca6

Why We Are All Getting a Little Crazy

November 03, 2011 Added by:Richard Thieme

The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Kaspersky Warns of Threat from Cyber Terrorism

November 02, 2011 Added by:Headlines

"I don't want to speak about it. I don't even want to think about it. But we are close, very close, to cyber terrorism. Perhaps already the criminals have sold their skills to the terrorists - and then... oh, God," said Kaspersky...

Comments  (0)

6d117b57d55f63febe392e40a478011f

Hacker Halted: Jeff Bardin on the Cyber Intelligence Cycle

October 30, 2011

"Criminals and nation-states have adopted traditional physical intelligence techniques for the cyber world. Jeff Bardin examines various CYBINT and OSINT methods, information mining of social networking sites and the tools in use for gathering information on targets of opportunity...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Beefs Up PLA's Cyber Militia

October 21, 2011 Added by:Headlines

"Effectively acting as a PLA-associated technical reserve, its mostly under-thirty part-timers are drawn largely from civilian companies and university-level institutes operating in electronic fields. A national guard of cyber soldiers..."

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

W32.Duqu - Harbinger of the Next Stuxnet?

October 19, 2011 Added by:Ron Baklarz

The new malcode has so much in common with Stuxnet, it is purported to have been written by the authors. W32.Duqu's primary purpose is intelligence gathering by focusing on industrial control system manufacturers with likely intent on future attacks against targeted victims...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

The Son of Stuxnet? Methinks the Cart be Before Ye Horse

October 19, 2011 Added by:Infosec Island Admin

And therein lies the rub. DUQU has a 36 day shelf life. Now, this is good from a foot-printing level AND could be excellent for setting up the next attack vector that could include the component of sustained access. It was a recon mission and that was all...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

News Applications: Considerations and Dangers

October 12, 2011 Added by:Joel Harding

The next wave of cyber attacks will come through smart phones, cell phones and their data networks. Smart phones are almost ubiquitous and attacks launched either using the smart phones or attacking smart phones will be devastating on a scale we have not seen to date...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »