According to the 9b+ security research blog, the email targeted a member of the Tibetan Youth Congress in India.
A group delivering a malicious toolkit, called NetTraveler, has used two commonly exploited vulnerabilities in Microsoft Word to steal data from more than 300 victims.
Every Friday, after the SC Magazine news team has taken a few spins around the interwebs, we post some security-related links that we found interesting. We hope you do too.
The 100-page report mostly addresses alleged Chinese cyber espionage operations, and suggests it's time for U.S. government agencies and corporations to consider more proactive approaches, possibly including hack-backs.
Attackers who raided Google in 2010 to learn information about Chinese human rights activists were also trying to gain insight on which Chinese intelligence agents were on the radar of U.S. authorities, according to a report.
Researchers at security firm Norman on Monday, building on earlier analysis from ESET, publicized a new attack infrastructure that is conducting national security and industrial espionage on targets across the world.
The proposal from two Republican and two Democratic senators requires the director of national intelligence to create a "watch list" of nations suspected of cyber spying.
As nations engage with one another in shadowy conflicts taking place in the digital sphere, experts are questioning whether treaties and rules that were created for kinetic fighting apply to a new era of combat.
The Travnet botnet uploads Microsoft Office files, PDFs and text files to remote servers run by attackers.
Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?
China and the United States plan to erect a cyber security working group in light of continued worries over the former's alleged cyber espionage activities, according to reports.
Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.
The rule, part of a general appropriations bill signed by President Obama last week, comes following growing evidence of China's organized cyber espionage operations.
Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense Systems and Services.
Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.
In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.
According to the legislation, the review process will quell cyber espionage threats from China.
A recently fixed Internet Explorer vulnerability is being leveraged to spy on the activists.
While intellectual property theft at the hands of regular employees may not yield the provacative headlines as a Chinese military unit spreading APTs from an office in Shanghai, the former scenario is the more likely one.
The Chinese official said the country is being unfairly singled out as a purveyor of corporate espionage, and it is supportive of developing agreed-upon international rules of conduct in cyber space.
Cyber war is not as common as the mainstream news cycle would have us believe, but its definition is not as cut-and-dry either. Just because nothing is blowing up doesn't mean it isn't happening. It's all about the context.
Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.
Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.
The news comes after a detailed report emerged that U.S. firms were the target of Chinese government-backed espionage operations.
Security firm Mandiant may have documented among the most convincing evidence to date of the significant espionage threat emanating from China.
The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?
Less than a day after The New York Times revealed that its reporters were targeted by Chinese hackers, The Wall Street Journal disclosed on Thursday that its systems were also breached by attackers from China wanting to observe the newspaper's coverage of the country.
Researchers said that domain names associated with the attack infrastructure were shut down soon after the spy campaign came to light.
In addition to using vulnerabilities in Microsoft Office products, attackers behind the cyber espionage campaign used a Java exploit, which has had a patch available since 2011.
Researchers at Kaspersky believe the Red October campaign, which is spreading a data-sucking trojan known as Rocra, dates back at least five years, and is still ongoing.