Blog Posts Tagged with "Espionage"
September 12, 2011 Added by:Headlines
“Preventing the loss or compromise of high-technology and vital national security information is a top priority of the FBI. This case is a prime example of what happens when a person decides to sell our nation’s most valuable secrets for individual gain..."
September 06, 2011 Added by:Joel Harding
Eli Lake of the Washington Post is again using our fear of the unknown against us. In his article, he brings up Huawei's attempts to operate as, well, a business. Huawei is accused, as a high tech telecommunications company, of attempting to get equipment onto the US 4G cell network...
September 01, 2011 Added by:Joel Harding
While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...
August 30, 2011 Added by:Headlines
"We consider those conclusions to be largely unfounded and not a good measure of the real threat level. Also, we cannot concede that the McAfee analyst was not aware of the groundlessness of the conclusions, leading us to being able to flag the report as alarmist," Eugene Kaspersky said...
August 26, 2011 Added by:Infosec Island Admin
China has been working us over for a long time, and with each day’s passing we have been steadily more compromised by the 7th directorate and their proxy hacking groups. This is not to say that others aren’t doing the same thing as well, China just happens to be the more active...
August 16, 2011 Added by:Headlines
"Victims get a message from an address of a close associate or a collaborating organization/agency, which is spoofed. The message is crafted to look like a subscription form offering to enter Gmail credentials to activate it..."
August 11, 2011 Added by:Headlines
"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"
July 29, 2011 Added by:Headlines
"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...
July 26, 2011 Added by:Headlines
The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...
July 18, 2011 Added by:Infosec Island Admin
Espionage by the Chinese has been a favorite past time for them with regard to the U.S. and now that espionage is taking place within computer networks. But this too has been happening for a long time (see Titan Rain or others like Moonlight Maze)...
July 16, 2011 Added by:Headlines
Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...
July 14, 2011 Added by:Headlines
"Far from militarizing cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," deputy secretary of defense William Lynn said in a speech at the National Defense University at Fort McNair...
June 22, 2011 Added by:Infosec Island Admin
Is this a cut out account for someone looking to garner access to others with information they desire? This is the same type of action that Anna Chapman was undertaking with some of her compatriots for the SVR while living in the United States: Gathering intelligence via LinkedIn...
June 17, 2011 Added by:Headlines
"What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a response. If, however, the explosive is a digital bomb that could do even more damage, our response is apparently muted—especially from our government..."
June 14, 2011 Added by:Infosec Island Admin
For groups like Lulzsec, they are passing from the nuisance category into perceived enemies of the state. Once they start attacking government and military targets, they are likely to see a more hardened response from intelligence agencies as well as the likes of the FBI...
June 07, 2011 Added by:Headlines
"If it's any kind of military espionage, military adversaries are going to be high on the list. The question then is who in China--is it government agents or independent contractors selling to the Chinese government?" asked Veracode's Chris Wysopal...
Making Sense of Split Tunneling ... Caring Match on 08-27-2014
Making Sense of Split Tunneling ... Marco Schmidt on 08-26-2014
Making Sense of Split Tunneling ... Caring Match on 08-26-2014