Intellectual Property

Feds charge man with hacking Energy Department

A 23-year-old Pennsylvania man compromised two supercomputers belonging to the National Energy Research Scientific Computing Center.

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

By

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Symantec: Hackers did steal code, but it's old

By

Symantec confirmed late Thursday that hackers did in fact compromise a portion of its source code, but the stolen code is related to two enterprise security products that have been discontinued.

Hackers say they have Symantec's Norton AV source code

By

A Symantec spokesman said the company isn't sure if the hackers claims are true, but said no source code -- only a document from 1999 -- has so far been publicly posted.

"Nitro" attacks target 29 firms in chemical sector

By

Hackers over the summer targeted at least 29 companies in the chemical sector during an attack campaign aimed at stealing intellectual property.

China disputes claim hackers breached U.S. satellites

By

China is denying a U.S. congressional committee's claim that hackers interfered with two government satellites.

Report: RSA hackers knock off 760 other businesses

eBay, Motorola, IBM, McAfee and VMware were reportedly affected by same type of attack orchestrated against RSA.

College server infected, possibly to steal research data

By

The personal information of tens of thousands of University of Wisconsin-Milwaukee (UWM) students and employees is at risk after a server was discovered to be infected with malware.

Lawmaker requests McAfee briefing to discuss Shady RAT

By

A California congresswoman has requested a meeting with McAfee's head researcher and his team following the security company's release last week of a 14-page report chronicling a persistent hacking campaign affecting some 50 U.S. organizations.

Senators call on SEC to mandate more breach reporting

By

A group of senators are asking the Securities and Exchange Commission to clarify the reporting responsibility of companies that are breached, as a means to protect investors.

Verizon report finds less shrewd attacks but more breaches

By

With sophisticated hackers such as Albert Gonzalez behind bars, last year's crop of digital intruders were less slick but more prolific, according to the security industry's landmark data breach report.

WordPress.com servers hacked to steal source code

By

Hackers have breached several servers belonging to WordPress.com to steal source code, the founder of the popular blogging platform revealed Wednesday.

Intellectual property strategies for security developers

Intellectual property strategies for security developers

As the security market continues to heat up, vendors must take steps to avoid patent infringement lawsuits.

Corporate data is new target of cybercrime

By

Cybercriminals have shifted their efforts from targeting individuals' personal information to the intellectual capital of global corporations, according to a report released Monday.

RSA breach leaves customers waiting for answers

By

Experts are unclear about the level of risk facing RSA customers after the security firm on Thursday reveled that hackers successfully breached its systems.

RSA: Hackers breached us of intellectual property

By

Hackers have successfully infiltrated security firm RSA to steal information related to its two-factor authentication products, the company's president revealed in a letter Thursday to customers.

Political hacker takes credit for Wikileaks DDoS attack

By

A political hacker has claimed responsibility for a distributed denial-of-service (DDoS) that took down Wikileaks.org just before a planned release of confidential documents.

Worried about logic bombs? You should be

Worried about logic bombs? You should be

All IP-enabled devices are at risk to devastating attacks that can result in the theft of intellectual property, or worse.

U.S.-Canada research team penetrate cyberspy network

By

Yet another complex -- but stealthy and effective -- cyberespionage network has turned up, this one largely targeting Indian computer systems. Again, the operation is believed to be run out of China.

Study finds businesses spending too much on compliance

By

A new report from Forrester Research's consulting arm reveals that organizations are focusing too much on compliance and not nearly enough on protecting valuable proprietary information.

Security report finds Chinese cyberspying threat growing

By

The Chinese government likely is endorsing cyberespionage against the United States, a new government advisory commission report, released Thursday, found.

Cyberattacks: A call for collaborative action

Cyberattacks: A call for collaborative action

We need to develop a collective consciousness for coping with the growing menace of cyber attacks, says Stanton Sloane.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US