Blog Posts Tagged with "Cyber Espionage"

69dafe8b58066478aea48f3d0f384820

Panetta Treads Lightly Around Chinese Cyber Attacks

May 10, 2012 Added by:Headlines

"I can hardly agree with the proposition that the cyber attacks directed to the United States are directly coming from China. And during the meeting, Secretary Panetta also agreed on my point that we cannot attribute all the cyber attacks in the United States to China..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Big Boy Politics: Rep. Frank Wolf Demonstrates

May 09, 2012 Added by:Joel Harding

Congressman Wolf, why don’t you establish a program, for the sake of national security, inspecting equipment originating from outside the US, looking for embedded malicious code and backdoors as well as inspecting software updates for that equipment for the same?

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Don’t Forget about VoIP Exposures and PBX Hacking

April 24, 2012 Added by:Brent Huston

There are now a variety of tools, exploits and frameworks built for attacking VoIP installations and they are a target for both automated tools and manual hacking. Access to VoIP systems can provide a great platform for intelligence, recon, industrial espionage and toll fraud...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

A Navy SEAL Provides Lessons on Security

April 12, 2012 Added by:Ali-Reza Anghaie

Powerful Peace absolutely applies in our field. Information Security professionals can draw out the roadmap to economic and potential physical catastrophe. In this field we won't have the benefit of hindsight, we need to get it right before it gets out of control...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Officials Warn of Global Cyber Arms Race

April 11, 2012 Added by:Headlines

"What we're looking at is a global cyber arms race. It's not proceeding at a leisurely or even a linear fashion but in fact is accelerating. I wouldn't claim that it's following Moore's law, but the curve looks kind of similar," said U.S. Cyber Command's Rear Admiral Samuel Cox...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Real Questions about Huawei for US Rep. Frank Wolf

April 03, 2012 Added by:Joel Harding

The Congressman was obviously attempting to either persuade the US China Economic and Security Commission or reassure them about Huawei. He passionately made a one-sided statement but failed to provide any evidence aside from one news report in that day’s Washington Post...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Taking the Crowbar to Cyber-Denying Eyes

April 03, 2012 Added by:Don Eijndhoven

Making your own arbitrary definition of Cyber Warfare and discounting MOUNTAINS of evidence that undermine your point isn't very scholarly to say the least. Can we please stop giving a stage to these people who are obviously cherry-picking their way to an uninformed argument?

Comments  (9)

03b2ceb73723f8b53cd533e4fba898ee

Operation Luckycat Targets Tibet, Japan and India

April 02, 2012 Added by:Plagiarist Paganini

Of course, the involvement of Gu Kaiyuan doesn't prove the campaigns are officially sponsored by the Chinese government, but the targets chosen leads the experts believe that the Beijing government is behind the Operation Luckycat attacks...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks are Fastest Growing National Security Threat

March 22, 2012 Added by:Bill Gerneglia

Cybercrime is a relatively new phenomenon but because of its recent scale and game-changing implications for both government and industry it is rapidly becoming the dominant risk theme of the 21st century. The opportunity for cyber attacks grows daily...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

China Also the Target of Cyber Attacks

March 21, 2012 Added by:Plagiarist Paganini

The Chinese government has been accused of pursuing an aggressive cyber strategy against foreign companies. Of course, China is also the target of cyber attacks, and many experts are convinced that despite their aggressive cyber offense, Chinese cyber defense is not so efficient...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Use of Social Networks for Cyber Espionage

March 13, 2012 Added by:Plagiarist Paganini

There has been an upsurge in cyber espionage by governments in search of information relating to military and industrial technologies. Of strategic importance for these activities are social networks through which one can trace a target's relationships, habits, and location...

Comments  (1)

E11e506024f5d2b70f037b9af4734f33

Chinese Network Operations and Cyber Espionage Capabilities

March 09, 2012 Added by:Stefano Mele

Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

APT: What It Is and What It’s Not

February 10, 2012 Added by:Infosec Island Admin

They can use the most elegant of solutions and nimbly change their tactics, on the fly create/edit code to defeat the defender's tactics, and use the most simplistic of attacks in the effort to gain access KEEP it as long as possible to succeed in their own ends...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

A Conversation With Richard Clarke – Part II

February 04, 2012 Added by:Fergal Glynn

Chris Wysopal and cyber security expert Richard Clarke continue their discussion on the changing cyber threat environment, the evolving cyber legislation landscape, and steps you can take to strengthen your organization’s resilience...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

A Conversation with Richard Clarke – Part I

January 31, 2012 Added by:Fergal Glynn

Chris Wysopal and internationally-renowned cyber security expert Richard Clarke discuss the changing cyber threat environment, the evolving cyber legislation landscape, and steps you can take to strengthen your organization’s resilience...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Cyber Shafarat 2012: Cyber Warfare, OpSec and Intelligence

January 30, 2012 Added by:

Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...

Comments  (0)

Page « < 1 - 2 - 3 - 4 > »