Espionage

Senators introduce bill that would flag countries, products that benefit from espionage

Senators introduce bill that would flag countries, products that benefit from espionage By

The proposal from two Republican and two Democratic senators requires the director of national intelligence to create a "watch list" of nations suspected of cyber spying.

2 minutes on: The rule of war

By

As nations engage with one another in shadowy conflicts taking place in the digital sphere, experts are questioning whether treaties and rules that were created for kinetic fighting apply to a new era of combat.

Travnet trojan compresses files to send more info to data thieves

By

The Travnet botnet uploads Microsoft Office files, PDFs and text files to remote servers run by attackers.

The power and danger of using the cyber "T" word

By

Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?

China, U.S. agree to work together on cyber security

By

China and the United States plan to erect a cyber security working group in light of continued worries over the former's alleged cyber espionage activities, according to reports.

White House says new Chinese IT equipment rule may disrupt business without helping security

White House says new Chinese IT equipment rule may disrupt business without helping security By

Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.

China unhappy with new U.S. requirement that its IT gear must face review

By

The rule, part of a general appropriations bill signed by President Obama last week, comes following growing evidence of China's organized cyber espionage operations.

Cyber war, this is not

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

You are an APT target

You are an APT target

Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense Systems and Services.

Debate: China is the top cyber threat to the United States

In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.

New U.S. law says government agencies will need OK before buying Chinese IT equipment

By

According to the legislation, the review process will quell cyber espionage threats from China.

New "watering hole" attack plants malware at news sites to spy on Chinese dissidents

New "watering hole" attack plants malware at news sites to spy on Chinese dissidents By

A recently fixed Internet Explorer vulnerability is being leveraged to spy on the activists.

Worry more about the cubicle dweller and less about the Chinese hacker

Worry more about the cubicle dweller and less about the Chinese hacker

While intellectual property theft at the hands of regular employees may not yield the provacative headlines as a Chinese military unit spreading APTs from an office in Shanghai, the former scenario is the more likely one.

China's foreign minister: Cyber space needs rules, not war

By

The Chinese official said the country is being unfairly singled out as a purveyor of corporate espionage, and it is supportive of developing agreed-upon international rules of conduct in cyber space.

Defining the qualities of cyber warfare

Defining the qualities of cyber warfare

Cyber war is not as common as the mainstream news cycle would have us believe, but its definition is not as cut-and-dry either. Just because nothing is blowing up doesn't mean it isn't happening. It's all about the context.

RSA 2013: Foreign cyber spies setting eyes on U.S. solar energy industry

By

Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.

RSA 2013: Security wonks debate whether China will get the message to stop hacking

By

Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.

U.S. may rely on trade sanctions, fines to curb foreign cyber spy threat

U.S. may rely on trade sanctions, fines to curb foreign cyber spy threat By

The news comes after a detailed report emerged that U.S. firms were the target of Chinese government-backed espionage operations.

Report on China spy threat may make attackers have to work harder

By

Security firm Mandiant may have documented among the most convincing evidence to date of the significant espionage threat emanating from China.

Battle lines drawn: Nation-state threats

Battle lines drawn: Nation-state threats

The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?

Wall Street Journal also a victim of espionage

By

Less than a day after The New York Times revealed that its reporters were targeted by Chinese hackers, The Wall Street Journal disclosed on Thursday that its systems were also breached by attackers from China wanting to observe the newspaper's coverage of the country.

Two security firms disclose "Red October" details

By

Researchers said that domain names associated with the attack infrastructure were shut down soon after the spy campaign came to light.

Red October spy ring also used "Rhino" Java exploit

By

In addition to using vulnerabilities in Microsoft Office products, attackers behind the cyber espionage campaign used a Java exploit, which has had a patch available since 2011.

"Red October" spy campaign uncovered, rivals Flame virus

By

Researchers at Kaspersky believe the Red October campaign, which is spreading a data-sucking trojan known as Rocra, dates back at least five years, and is still ongoing.

Microsoft rushes fix for Internet Explorer vulnerability

By

The software giant is taking the rare step of issuing an out-of-cycle patch for a dangerous IE bug that is being used in ongoing spy attacks.

John McAfee says he led cyber spy ops in Belize

By

The namesake of security company McAfee, who returned to the U.S. less than a month ago, now claims he used cyber espionage tactics to uncover corruption among the power players of Belize.

Latest IE attacks connected to espionage group

By

Symantec has linked exploits that leverage a new zero-day vulnerability in Internet Explorer to the group responsible for a spate of recent espionage attacks.

Russian space, telecom industries targeted by espionage

By

The United States isn't the only nation in the crosshairs of cyber spies seeking sensitive information from various industries.

Web exclusive: A look ahead

Web exclusive: A look ahead By

A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.

Israel is a cyber target, but also an aggressor

By

The sophisticated worm Stuxnet must be mentioned in any stories or discussions around Israel being targeted by attacks related to its ongoing conflict with Gaza.

Advertisement

How to Prevent Insider Threats!

POLL