Espionage

White House says new Chinese IT equipment rule may disrupt business without helping security

White House says new Chinese IT equipment rule may disrupt business without helping security By

Several U.S. trade groups also have objected to the provision, part of a recently passed appropriations bill, which bars certain federal agencies from buying IT tech gear produced by Chinese government-related companies.

China unhappy with new U.S. requirement that its IT gear must face review

By

The rule, part of a general appropriations bill signed by President Obama last week, comes following growing evidence of China's organized cyber espionage operations.

Cyber war, this is not

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

You are an APT target

You are an APT target

Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense Systems and Services.

Debate: China is the top cyber threat to the United States

In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.

New U.S. law says government agencies will need OK before buying Chinese IT equipment

By

According to the legislation, the review process will quell cyber espionage threats from China.

New "watering hole" attack plants malware at news sites to spy on Chinese dissidents

New "watering hole" attack plants malware at news sites to spy on Chinese dissidents By

A recently fixed Internet Explorer vulnerability is being leveraged to spy on the activists.

Worry more about the cubicle dweller and less about the Chinese hacker

Worry more about the cubicle dweller and less about the Chinese hacker

While intellectual property theft at the hands of regular employees may not yield the provacative headlines as a Chinese military unit spreading APTs from an office in Shanghai, the former scenario is the more likely one.

China's foreign minister: Cyber space needs rules, not war

By

The Chinese official said the country is being unfairly singled out as a purveyor of corporate espionage, and it is supportive of developing agreed-upon international rules of conduct in cyber space.

Defining the qualities of cyber warfare

Defining the qualities of cyber warfare

Cyber war is not as common as the mainstream news cycle would have us believe, but its definition is not as cut-and-dry either. Just because nothing is blowing up doesn't mean it isn't happening. It's all about the context.

RSA 2013: Foreign cyber spies setting eyes on U.S. solar energy industry

By

Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.

RSA 2013: Security wonks debate whether China will get the message to stop hacking

By

Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.

U.S. may rely on trade sanctions, fines to curb foreign cyber spy threat

U.S. may rely on trade sanctions, fines to curb foreign cyber spy threat By

The news comes after a detailed report emerged that U.S. firms were the target of Chinese government-backed espionage operations.

Report on China spy threat may make attackers have to work harder

By

Security firm Mandiant may have documented among the most convincing evidence to date of the significant espionage threat emanating from China.

Battle lines drawn: Nation-state threats

Battle lines drawn: Nation-state threats

The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?

Wall Street Journal also a victim of espionage

By

Less than a day after The New York Times revealed that its reporters were targeted by Chinese hackers, The Wall Street Journal disclosed on Thursday that its systems were also breached by attackers from China wanting to observe the newspaper's coverage of the country.

Two security firms disclose "Red October" details

By

Researchers said that domain names associated with the attack infrastructure were shut down soon after the spy campaign came to light.

Red October spy ring also used "Rhino" Java exploit

By

In addition to using vulnerabilities in Microsoft Office products, attackers behind the cyber espionage campaign used a Java exploit, which has had a patch available since 2011.

"Red October" spy campaign uncovered, rivals Flame virus

By

Researchers at Kaspersky believe the Red October campaign, which is spreading a data-sucking trojan known as Rocra, dates back at least five years, and is still ongoing.

Microsoft rushes fix for Internet Explorer vulnerability

By

The software giant is taking the rare step of issuing an out-of-cycle patch for a dangerous IE bug that is being used in ongoing spy attacks.

John McAfee says he led cyber spy ops in Belize

By

The namesake of security company McAfee, who returned to the U.S. less than a month ago, now claims he used cyber espionage tactics to uncover corruption among the power players of Belize.

Latest IE attacks connected to espionage group

By

Symantec has linked exploits that leverage a new zero-day vulnerability in Internet Explorer to the group responsible for a spate of recent espionage attacks.

Russian space, telecom industries targeted by espionage

By

The United States isn't the only nation in the crosshairs of cyber spies seeking sensitive information from various industries.

Web exclusive: A look ahead

Web exclusive: A look ahead By

A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.

Israel is a cyber target, but also an aggressor

By

The sophisticated worm Stuxnet must be mentioned in any stories or discussions around Israel being targeted by attacks related to its ongoing conflict with Gaza.

Embattled Huawei may open its code for testing in Australia

By

The Chinese network equipment maker is under fire in Australia, Canada and the United States over concerns that its code presents cyber espionage capabilities.

White House review clears Chinese IT maker of spy threat

By

The 18-month White House probe determined that there is no evidence that Huawei was involved in spying on behalf of the Chinese government, which runs counter to a U.S. House report released last week.

Cyber security market to reach $120B by 2017

By

Driven by increasing use of cloud and mobile services, and cyber criminal activity from hacktivists, terrorist groups, nation-state actors and those out for financial gain, the global cyber security market is expected to grow by 11.3 percent each year.

AutoCAD worm steals blueprints in industrial theft

By

Blueprint drawings in Peru are the latest target of information-stealing malware, after researchers at ESET discovered the Medrea worm in circulation.

Report: Like Stuxnet, the U.S. also built Flame virus

Suspicions that the sophisticated espionage toolkit Flame was created by the same authors as Stuxnet are true, according to a published report.

Sign up for our newsletters

POLL