Cyber Espionage News, Articles and Updates
The Swiss defense department was hit with a cyber attack.
One of the many possible cyber scenarios keeping U.S. commanders awake at night is having the Islamic State develop the capability to alter sensitive information that could endanger American forces.
A new back door trojan created to siphon information has been detected by Symantec researchers.
A report finds terrorists are largely uninterested in using readily available communication methods found on the dark web.
Defense Secretary Ash Carter used his personal email account to conduct official business until December 2015, according to documents revealed from a Freedom of Information Act request.
A Chinese citizen pleaded guilty yesterday to participating in a conspiracy to hack into the computer systems of several major U.S. defense manufacturers.
U.S. government attempts to fend off millions of cybersecurity threats each year, according to a report released by the Office of Management and Budget (OMB).
The National Institute of Standards and Technology (NIST) released draft guidance for telework protocol, an update to the federal agency's initial documents drafted in 2009.
U.S. officials expect successful cooperation with the private sector will bear little resemblance to a traditional recruiting model.
Security researchers laid out potential scenarios for the future of cyberespionage on Wednesday at the RSA Conference in San Francisco.
The NSA's SKYNET program earned some unwanted attention after a report said the agency's machine learning algorithm is inadequate.
The Senate Homeland Security and Governmental Affairs Committee approved Beth Cobert as nominee for director of the Office of Personnel Management (OPM).
The National Security Agency unveiled an ambitious reorganization that pulls together the agency's offensive and defensive operations.
The Better Business Bureau posted a notice to help potential victims of the Office of Personnel Management (OPM) breach and others determine whether letters claiming to be from the OPM are legitimate.
Microsoft unveiled a revised policy to inform users when it believes an account has been targeted by state-sponsored hackers.
China's anti-terrorism legislation is the latest escalation in a race between China and Western government to enact aggressive surveillance policy.
France reportedly saw a sharp increase in attempted cyber attacks in the weeks leading up to the terror attacks in Paris last week.
The mysterious group behind the 2013 cyber attacks that crippled South Korean news stations, financial institutions, and government websites is likely the same attacker behind malware that appeared in Europe recently, according to Palo Alto Networks.
In an environment in which cyber professionals are overwhelmed by rapidly changing security threats, industry pros generally agree that a remediation plan must involve difficult decisions about the security issues that companies are willing to accept the risk rather than take action.
U.S. and Cuban officials met Monday to discuss cybercrime, according to the State Department.
Check Point Software Technologies published a report on Monday that identifies a man it believes to be the mastermind behind Rocket Kitten's phishing emails and attacks.
German police, working with the European Union's criminal intelligence and judicial agencies Europol and Eurojust, conducted raids on the homes of DroidJack users throughout Germany.
The U.S. and South Korea announced that the two nations will begin working together to implement stronger cybersecurity strategies.
Following a rising number of cyberattacks against U.S. companies, cyber insurance premiums have spiked this year, according to Marsh data.
The Chinese government arrested a group of hackers within its borders at the request of the U.S. government, anonymous U.S. officials told the Washington Post.
The United States and China announced Friday that the two nations have agreed to initial norms of cyber activities.
Kaspersky Lab claims to have pinpointed how the Turla cyber-espionage group has been able to hide its command and control servers for the past eight years.
The Darkhotel APT group swapped out its previous Flash zero-days this past month for an exposed Hacking Team zero-day.
A secret NSA map was obtained by a news outlet shows the locations of "Victims of Chinese Cyber Espionage" targets based in the U.S.
Vague language in a new Chinese security law has multinational tech firms concerned that China may use it to force them to build backdoors or provide encryption keys and source code.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Check Point tracks two waves of Cerber ransomware hitting U.S., UK
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- MIRCOP ransomware blames victim for attack, demands $28K ransom
- CYBERCOM 'reluctant' to cut off Islamic State internet
- Chinese tech professional caught selling secrets
- How 154M U.S. voter records will affect Americans' security - industry reacts