Blog Posts Tagged with "Operation Aurora"

03b2ceb73723f8b53cd533e4fba898ee

Rapid 7 Analysis of Data Breach Incidents

September 11, 2012 Added by:Plagiarist Paganini

Excluding attacks by foreign governments and cyber criminals that exploit 0-days, with best practices and the adoption of compliance at the current standard, in matters of security it is possible to avoid data breach incidents, or at least reduce the amount of exposed information...

Comments  (0)

201d6e4b7cd0350a1a9ef6e856e28341

What's More Important - Vulnerabilities or Actual Incidents?

February 13, 2012 Added by:Joe Weiss

To at least some of us in the control systems community these vulnerabilities are not unexpected. The fact that many of these systems are also connected to the Internet as Eireann Leverett demonstrated is also not new, even though the numbers of control system connected to the Internet are striking.

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Cyber Espionage: A Buzzword-Term Often Overused

January 23, 2012 Added by:Infosec Island Admin

The Cuckoo’s Egg”, which happened in 1986, is the first "documented” case of computer espionage that is not classified. Cliff Stoll was asked to look into an accounting error on a University system and ended up finding and tracking an asset for the KGB...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

From China with Love: The Chairman Meow Collection

August 26, 2011 Added by:Infosec Island Admin

China has been working us over for a long time, and with each day’s passing we have been steadily more compromised by the 7th directorate and their proxy hacking groups. This is not to say that others aren’t doing the same thing as well, China just happens to be the more active...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Richard Clarke: China's Cyberassault on America

June 17, 2011 Added by:Headlines

"What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a response. If, however, the explosive is a digital bomb that could do even more damage, our response is apparently muted—especially from our government..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Acknowledges Existence of Cyberwarfare Unit

May 26, 2011 Added by:Headlines

While numerous nations are involved in varying levels of cyber aggression, what makes the Chinese threat so much more palpable is the systemic nature and comparatively large scale of the state-sponsored cyber-offensive operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Holds the Advantage in Cyber Espionage Game

April 14, 2011 Added by:Headlines

According to Brenner, thousands of U.S. companies were targeted in the Aurora attacks, a great deal more than the 34 companies publicly identified. Brenner says the scale of the operation demonstrates China's "heavy-handed use of state espionage against economic targets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Leaked Emails Reveal Morgan Stanley Hit in Aurora Attacks

March 01, 2011 Added by:Headlines

Emails leaked in the HBGary Federal network breach reveal that financial firm Morgan Stanley was also a victim of the highly sophisticated Aurora cyber attacks. "They were hit hard by the real Aurora attacks (not the crap in the news)," read an e-mail by a senior security engineer at HBGary...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Get Back to Basics: Stuxnet and Aurora Lessons

February 24, 2011 Added by:Headlines

The plain fact is that most organizations are falling far short in protecting against the same threats that they've faced for the last 10 years. SQL injection, phishing, malicious attachments, social engineering. Old, every one of them. And yet, still incredibly effective at compromising networks in some of the best-known and theoretically best-protected companies.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Why the Cloud is a Security Nightmare

January 27, 2011 Added by:Dan Dieterle

Hackers will leverage the power of the cloud themselves to attack government and enterprise encrypted systems. Recently, it was shown that WPA encryption could be cracked using the computing power of the cloud...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Ten Big Information Security Stories from 2010

January 02, 2011 Added by:Headlines

The ensemble does not focus solely on the pop-security issues that made the biggest headlines per se, but is instead a thoughtful examination of some of the stories that will prove to have the biggest impact and long term effects on the information security field as a whole...

Comments  (0)