Blog Posts Tagged with "Espionage"
June 06, 2011 Added by:Scot Terban
China's Dark Visitor movement of the 1990′s has morphed into a government espionage wing. What was once a loosely affiliated group of patriotic hackers has been honed by the Peoples Liberation Army into a force to be reckoned with on the stage of digital espionage and data theft...
June 02, 2011 Added by:Headlines
“I’d like to see us create a working group which talks about cybersecurity espionage and cyber conflict in a big way. Cybersecurity is now intertwined with international security, and you can't divorce it from that...”
May 26, 2011 Added by:Headlines
While numerous nations are involved in varying levels of cyber aggression, what makes the Chinese threat so much more palpable is the systemic nature and comparatively large scale of the state-sponsored cyber-offensive operations...
May 09, 2011 Added by:Headlines
The bill prohibits any engagements “to develop, design, plan, promulgate, implement or execute a bilateral policy, program, order, or contract of any kind to participate, collaborate, or coordinate bilaterally in any way with China or any Chinese-owned company..."
May 02, 2011 Added by:Headlines
The Chinese have long seen a tactical cyber offensive capability as being a powerful equalizer in their quest to attain superpower status and undermine the effectiveness of international political rivals. The Chinese strategy extends well beyond potential military targets...
April 29, 2011 Added by:Scot Terban
Never mind if you work in a job that requires security, everyone should be cognizant when they are online talking to someone that they do not know in real life. From the common data thief to the corporate spy, we all may have data that someone wants and is willing to lie to get it...
April 23, 2011 Added by:Dan Dieterle
What could the Chinese hope to gain? Military secrets. Along with terabytes of data that have been stolen, the Chinese also obtained login credentials and blue prints to some of America’s hi-tech military equipment...
April 20, 2011 Added by:Scot Terban
Over the years the Chinese have made it their business to steal a lot of data. Some of it you would readily see as important militarily or for industrial espionage, but some of the data is much more arcane as to the reasons why they would make the efforts that they do to get it...
April 19, 2011 Added by:Headlines
Dead Drops is an anonymous, offline, peer to peer file-sharing network in a public space. USB flash drives are embedded into walls, buildings and curbs. Everyone is invited to drop or find files on a dead drop. Plug your laptop to a wall, house or pole to share your favorite files and data...
April 14, 2011 Added by:Headlines
According to Brenner, thousands of U.S. companies were targeted in the Aurora attacks, a great deal more than the 34 companies publicly identified. Brenner says the scale of the operation demonstrates China's "heavy-handed use of state espionage against economic targets..."
April 05, 2011 Added by:Headlines
The U.S. Army has confirmed that accused WikiLeaks source Bradley Manning had installed data-mining software on his SIPRnet-linked computer during the same period he is suspected of harvesting hundreds-of-thousands of classified government documents...
March 31, 2011 Added by:Don Eijndhoven
For now, very few experts take these measures seriously and fear that our National cyber defense posture will be weakened rather than strengthened. Let´s hope that this is not the case, because various research papers already point to The Netherlands as a haven for malware...
March 31, 2011 Added by:Headlines
"Today, we see constant attempts by cyber means to steal the nation's secrets, as well as information vital to the effective operation of critical national industries and infrastructure, not to mention commercial intelligence and criminal fraud..."
March 25, 2011 Added by:Robert Siciliano
Governments around the globe realize that it serves their military objectives to be well positioned online. The saying used to be, “He who controls the seas controls the world,” and then it was, “He who controls the air controls the world.” Now it’s all about controlling cyberspace...
March 25, 2011 Added by:Headlines
"Typically AT&T customers’ data would have routed over the AT&T network directly to Facebook’s network provider but due to a routing mistake their private data went first to Chinanet then via Chinanet to SK Broadband in South Korea, then to Facebook..."
March 19, 2011 Added by:Scot Terban
"A hacker startup calling itself Backtrace Security–made up of individuals who formerly counted themselves as part of Anonymous’ loose digital collective–announced plans Friday to publish identifying information on a handful of active members of Anonymous..."
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013