April 08, 2013
Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.
The rule, part of a general appropriations bill signed by President Obama last week, comes following growing evidence of China's organized cyber espionage operations.
April 01, 2013
Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.
April 01, 2013
Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense Systems and Services.
In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.
According to the legislation, the review process will quell cyber espionage threats from China.
March 25, 2013
A recently fixed Internet Explorer vulnerability is being leveraged to spy on the activists.
March 21, 2013
While intellectual property theft at the hands of regular employees may not yield the provacative headlines as a Chinese military unit spreading APTs from an office in Shanghai, the former scenario is the more likely one.
The Chinese official said the country is being unfairly singled out as a purveyor of corporate espionage, and it is supportive of developing agreed-upon international rules of conduct in cyber space.
March 11, 2013
Cyber war is not as common as the mainstream news cycle would have us believe, but its definition is not as cut-and-dry either. Just because nothing is blowing up doesn't mean it isn't happening. It's all about the context.
Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.
Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.
February 20, 2013
The news comes after a detailed report emerged that U.S. firms were the target of Chinese government-backed espionage operations.
Security firm Mandiant may have documented among the most convincing evidence to date of the significant espionage threat emanating from China.
February 01, 2013
The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?
Less than a day after The New York Times revealed that its reporters were targeted by Chinese hackers, The Wall Street Journal disclosed on Thursday that its systems were also breached by attackers from China wanting to observe the newspaper's coverage of the country.
Researchers said that domain names associated with the attack infrastructure were shut down soon after the spy campaign came to light.
In addition to using vulnerabilities in Microsoft Office products, attackers behind the cyber espionage campaign used a Java exploit, which has had a patch available since 2011.
Researchers at Kaspersky believe the Red October campaign, which is spreading a data-sucking trojan known as Rocra, dates back at least five years, and is still ongoing.
The software giant is taking the rare step of issuing an out-of-cycle patch for a dangerous IE bug that is being used in ongoing spy attacks.
The namesake of security company McAfee, who returned to the U.S. less than a month ago, now claims he used cyber espionage tactics to uncover corruption among the power players of Belize.
Symantec has linked exploits that leverage a new zero-day vulnerability in Internet Explorer to the group responsible for a spate of recent espionage attacks.
The United States isn't the only nation in the crosshairs of cyber spies seeking sensitive information from various industries.
December 03, 2012
A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.
The sophisticated worm Stuxnet must be mentioned in any stories or discussions around Israel being targeted by attacks related to its ongoing conflict with Gaza.
The Chinese network equipment maker is under fire in Australia, Canada and the United States over concerns that its code presents cyber espionage capabilities.
The 18-month White House probe determined that there is no evidence that Huawei was involved in spying on behalf of the Chinese government, which runs counter to a U.S. House report released last week.
Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.
Blueprint drawings in Peru are the latest target of information-stealing malware, after researchers at ESET discovered the Medrea worm in circulation.
Suspicions that the sophisticated espionage toolkit Flame was created by the same authors as Stuxnet are true, according to a published report.