Cyber Espionage

Secret NSA map shows Chinese cyberespionage targets in U.S.

By

A secret NSA map was obtained by a news outlet shows the locations of "Victims of Chinese Cyber Espionage" targets based in the U.S.

Tech firms fear vague language in Chinese security law could be used to force backdoors

By

Vague language in a new Chinese security law has multinational tech firms concerned that China may use it to force them to build backdoors or provide encryption keys and source code.

Senators propose bill to ban warrantless federal aerial surveillance

By

Lawmakers proposed "Protecting Individuals from Mass Aerial Surveillance Act" on Wednesday to require federal authorities to obtain warrants to conduct aerial surveillance.

Canadian woman accused of harassing adults, minors using RAT

By

A Canadian woman was arrested for allegedly infecting computers using a RAT, and harassing and spying on victims.

Puush urges users to change passwords after cyber attack

Puush urges users to change passwords after cyber attack

By

The screen sharing platform Puush was hit by a cyber attack this weekend that injected malware into the server.

NYPD officer arrested for hacking FBI databases

By

A (NYPD) officer was arrested Wednesday morning for allegedly hacking into a restricted NYPD computer and other sensitive law enforcement databases.

CSE spies on global file uploads

By

One of Canada's intelligence agencies has been secretly monitoring file downloads across the world for years.

'Sandworm Team' exploits zero-day bug in espionage campaign

'Sandworm Team' exploits zero-day bug in espionage campaign

By

A group of cybercriminals believed to be Russian are exploiting a zero-day vulnerability to deliver malware and gather information from various organizations around the world.

2013 eBook on cyber espionage

2013 eBook on cyber espionage

Nation-states can now skip over costly and time-consuming R&D by stealing corporate and government data and turning that information into a competitive advantage.

Chevron confirms 2010 Stuxnet hit

By

The oil giant confirms that Stuxnet infected its network back in 2010, when the malware was first discovered - making Chevron the first U.S. company to admit it was struck by the virus.

HP asks researcher not to reveal router bugs at ToorCon

Kurt Grutzmacher was planning to disclose and demo vulnerabilities in the networking products from Huawei and H3C, a subsidiary of HP.

After Flame and Gauss strike, MiniFlame takes aim

By

Already famous for their sophistication, Flame and Gauss malware have yielded a new develompent. Dubbed MiniFlame, the component is deployed after Flame and Gauss already are installed on targeted machines.

New espionage campaign tied to RSA breach, GhostNet attacks

By

Dell SecureWorks researchers believe recent attacks targeting oil and energy companies in various countries are connected to cyber criminals behind RSA's breach and the GhostNet esionage campaign.

Flame is lame? Not so much.

Flame is lame? Not so much.

Flame's cryptofunctionality silenced all the haters, says F-Secure's Mikko Hyppönen.

News briefs: Breaking security news from the Cybersecurity Act to Gauss

News briefs: Breaking security news from the Cybersecurity Act to Gauss

The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news

Preparing for a post-Flame world

Preparing for a post-Flame world

By

The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.

News briefs: Flame, Stuxnet, breach at LinkedIn and other security news

By

Flame, Stuxnet, breach at LinkedIn and other security news

The Flame virus is the "Threat of the Month"

The Flame virus is the "Threat of the Month"

Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate and is highly configurable.

Flame virus: Too hot to handle?

Flame virus: Too hot to handle?

By

While the characteristics of the spy virus are important to note, the question is why it went undetected for so long.

W32/Flamer detection failure: The real lesson

W32/Flamer detection failure: The real lesson

Does the fact that the Flame malware stayed below the radar for so long prove that signature detection is dead?

The Flame virus: Implications versus speculation

The Flame virus: Implications versus speculation

While the investigation is just beginning into the massive espionage toolkit known as Flame, which has targeted computers, mainly in Iran, it is important to consider the consequences of this malware.

On CISPA: Threat info sharing shouldn't be a spy project

By

Private and public sectors must take seriously the need to share threat data to prevent cyber attacks, but a heavy-handed approach like CISPA places us at far greater risk as a country.

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

By

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Tightening the fed's belt: Government Roundtable

Tightening the fed's belt: Government Roundtable

By

At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.

Cyber espionage

Cyber espionage

By

Instead of spending billions of dollars to supply massive armies, today's adversaries hire code-writers to create attacks that run autonomously for years with little or no human intervention.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US