Items Tagged with "Espionage"
March 25, 2011 Added by:Robert Siciliano
Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace...
March 25, 2011 Added by:Headlines
"Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to Chinanet then via Chinanet to SK Broadband in South Korea, then to Facebook..."
March 19, 2011 Added by:Scot Terban
"A hacker startup calling itself Backtrace Security–made up of individuals who formerly counted themselves as part of Anonymous’ loose digital collective–announced plans Friday to publish identifying information on a handful of active members of Anonymous..."
March 15, 2011 Added by:Richard Stiennon
The tools and methods include the use of custom Trojans, back hacking, infiltration, exfiltration, recruitment, IP signal intelligence, seeding, and poisoning. But getting actionable intelligence into the right hands is the hardest task. This post proposes one such operational structure...
March 13, 2011 Added by:Don Eijndhoven
Cyber Warfare is a fringe area. Information Security is poorly understood by the mainstream populace, a fact well evidenced by the digital exhibitionism taking place on the various social networking sites. In fact, it is even poorly understood within the IT sector itself...
March 11, 2011 Added by:Brent Huston
You have to be sharp to see through a social engineering attack. The challenge is to retain that sharpness while in the midst of multiple tasks. Most of the time, the attacker will take advantage of a busy receptionist, a chaotic office, or tired staff when they try their dastardly deed...
March 09, 2011 Added by:Headlines
Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...
February 19, 2011 Added by:Headlines
Attackers used targeted spear-phishing methods to gain access to executive's computers,then produced fraudulent emails that were sent out to numerous department staff. The emails contained attachments infected with malware that would harvest data and transmit the information to the attackers...
February 05, 2011 Added by:Headlines
British foreign secretary William Hague has issued statements confirming that government systems have been targeted by state-sponsored cyber espionage operations. Similar attempts to infiltrate government systems in the United States have also come to light...
February 02, 2011 Added by:Headlines
A series of emails were sent to five State Department officials who were engaged in sensitive negotiations with the Chinese government on greenhouse-gas emissions, and contained attachments infested with malware that would have allowed the attackers access to the recipient's computers...
January 25, 2011 Added by:Headlines
If you have been parodied on the long running prime-time animated series The Simpsons, you can rest assured that you have finally arrived. The most recent member of the coveted Simpson parody club is, believe it or not, none other than the Insider Threat...
January 07, 2011 Added by:Headlines
The insider threat to information security is an ever present and ever growing problem for the private and public sectors. Protecting against sensitive data loss events perpetrated by the very people entrusted with protecting the information is nearly a Sisyphean task...
January 03, 2011 Added by:Headlines
The Bank of America counter-espionage team includes consultants from the Booz Allen Hamilton, and is apparently focusing on details surrounding Bank of America's acquisitions of Merill Lynch and troubled lender Countrywide...
December 06, 2010 Added by:Headlines
A diplomatic memo from June of 2009 reveals that the Chinese security firm TOPSEC had access to the source code for Microsoft Windows and allowed the Chinese government to provided it to hackers in order to develop targeted attacks to exploit weaknesses in the operating system...
November 18, 2010 Added by:Headlines
Reports have asserted that the Chinese government is actively using Chinese telecom companies to conduct cyber espionage against the United States, and questions have been raised about partnerships with Chinese telecom companies and corporations tied to Governor-elect Rick Snyder of Michigan...