Blog Posts Tagged with "Espionage"

69dafe8b58066478aea48f3d0f384820

Insider Threat: Top Scientist Pleads Guilty to Espionage

September 12, 2011 Added by:Headlines

“Preventing the loss or compromise of high-technology and vital national security information is a top priority of the FBI. This case is a prime example of what happens when a person decides to sell our nation’s most valuable secrets for individual gain..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

China: What Evil Lurks Within?

September 06, 2011 Added by:Joel Harding

Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

The Cyberworld Points at China

September 01, 2011 Added by:Joel Harding

While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Experts Debate Merits of McAfee's Shady Rat Report

August 30, 2011 Added by:Headlines

"We consider those conclusions to be largely unfounded and not a good measure of the real threat level. Also, we cannot concede that the McAfee analyst was not aware of the groundlessness of the conclusions, leading us to being able to flag the report as alarmist," Eugene Kaspersky said...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

From China with Love: The Chairman Meow Collection

August 26, 2011 Added by:Infosec Island Admin

China has been working us over for a long time, and with each day’s passing we have been steadily more compromised by the 7th directorate and their proxy hacking groups. This is not to say that others aren’t doing the same thing as well, China just happens to be the more active...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Spear-Phishing Operation Targets Senior US Officials

August 16, 2011 Added by:Headlines

"Victims get a message from an address of a close associate or a collaborating organization/agency, which is spoofed. The message is crafted to look like a subscription form offering to enter Gmail credentials to activate it..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress Wants McAfee Briefing on Operation Shady Rat

August 11, 2011 Added by:Headlines

"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The U.S. and China are Engaged in a Cyber Cold War

July 29, 2011 Added by:Headlines

"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

UK Cabinet Office Report: The Cost of Cyber Crime

July 26, 2011 Added by:Headlines

The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

America Faced With Wave of Chinese Espionage

July 18, 2011 Added by:Infosec Island Admin

Espionage by the Chinese has been a favorite past time for them with regard to the U.S. and now that espionage is taking place within computer networks. But this too has been happening for a long time (see Titan Rain or others like Moonlight Maze)...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Weapon Systems Specs Stolen in Contractor Breach

July 16, 2011 Added by:Headlines

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Admits Largest-Ever Cyber Theft to Date

July 14, 2011 Added by:Headlines

"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Curious Case of the FBI Deputy Attache on LinkedIn

June 22, 2011 Added by:Infosec Island Admin

Is this a cut out account for someone looking to garner access to others with information they desire? This is the same type of action that Anna Chapman was undertaking with some of her compatriots for the SVR while living in the United States: Gathering intelligence via LinkedIn...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Richard Clarke: China's Cyberassault on America

June 17, 2011 Added by:Headlines

"What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a response. If, however, the explosive is a digital bomb that could do even more damage, our response is apparently muted—especially from our government..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

From Lulz to Global Espionage: The Age of the Cracker

June 14, 2011 Added by:Infosec Island Admin

For groups like Lulzsec, they are passing from the nuisance category into perceived enemies of the state. Once they start attacking government and military targets, they are likely to see a more hardened response from intelligence agencies as well as the likes of the FBI...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

China Linked to RSA and Defense Contractor Breaches

June 07, 2011 Added by:Headlines

"If it's any kind of military espionage, military adversaries are going to be high on the list. The question then is who in China--is it government agents or independent contractors selling to the Chinese government?" asked Veracode's Chris Wysopal...

Comments  (3)

Page « < 4 - 5 - 6 - 7 - 8 > »