Cyber Espionage

Type: Keyphrase
Name: Cyber Espionage
First reported 11 hours ago - Updated 7 hours ago - 1 reports

The Future of IT in the Manufacturing Industry--United States and Europe

The main research objective is to measure the current use and future decision making behaviour toward information technology (IT) within the manufacturing sector. Overall, companies from the manufacturing industry are avid users of many enterprise and ... [Published Individual.com - 11 hours ago]
First reported 15 hours ago - Updated 15 hours ago - 1 reports

Revelations about spy agencies alert telcos to private and public threats to security

Telecoms operators are at the heart of threats to security, because they maintain crucial infrastructure that business and government relies on. How big is the threat and what should they be doing? Luke Harding's book about Edward Snowden, wholeaked secret ... [Published Global Telecoms Business - 15 hours ago]
First reported Sep 29 2014 - Updated Sep 29 2014 - 1 reports

China says US hacking accusations are ‘totally groundless

The Chinese government says accusations that it was involved in cyberattacks against U.S. transportation contractors are 'totally groundless and untenable.'The U.S. Senate Armed Services Committee said Wednesday that the Chinese military stole emails, ... [Published Modern Ghana - Sep 29 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 2 reports

Cyberespionage Carries High Cost to U.S., Experts Say

Posted by Audrey McNeil on Sep 26 http://www.govtech.com/security/Cyber-Espionage-Carries-High-Cost-to-US-Expert-Says-.html In 2003, Chinese cyber espionage of the U.S. Department of Defense computersystem led to a theft of data equal to 20 percent ... [Published Seclists.org - Data Loss - Sep 26 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

China accused of spying on Danish defence industry

The cyber attack occurred between 2008 and 2012The Chinese J-20 fighter jet was allegedly developed using information stolen from the American F-35 program (Photo: WikiCommons-Alexandr Chechin)11:56A number of experts and sources have identified the foreign ... [Published Copenhagen Post - Sep 26 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

Five Ways Cyberterrorists Could Target the U.S.

Will the next terrorist attack occur in cyberspace?As the Western world becomes increasingly concerned about ISIS and the potential for homegrown terrorist attacks by its adherents, governments and their publics have focused their concerns more on traditional ... [Published Huffington Post - Sep 25 2014]
First reported Sep 24 2014 - Updated Sep 25 2014 - 1 reports

Adobe Systems to shut China R

BEIJING — Computer software maker Adobe Systems Inc will shut its Chinese research and development arm, as US technology firms face an increasingly hostile government in the world’s second-biggest economy.The California-based company will maintain its ... [Published Oman Observer - Sep 24 2014]
First reported Sep 17 2014 - Updated Sep 18 2014 - 3 reports

US, China In War of Words Over Alleged Cyber Attacks On American Defense Contractors

The US and China have launched a war of words over allegations made by a US congressional panel that Chinese government-linked hackers had launched dozens of cyberattacks on American defence contractors.Beijing has flat-out denied the charges, saying ... [Published Defense World - Sep 18 2014]
Entities: Cyber Attack, China, War
First reported Sep 11 2014 - Updated Sep 11 2014 - 2 reports

Chinese Attack Groups Operate in Parallel in Cyber Espionage Campaigns: FireEye

Researchers at FireEye have discovered two attack campaigns being orchestrated by different groups in separate regions of China that appear to be operating in parallel.The attack campaigns are focused on different targets. According to a team of FireEye ... [Published Security Week - Sep 11 2014]
First reported Sep 07 2014 - Updated Sep 08 2014 - 2 reports

New Mac Malware Used in Cyberespionage Campaign

A dangerous new type of Mac malware has been discovered, and the criminals behind it appear to be a group known for targeting United States industrial companies. Experts say the malware proves that cybercriminals are increasingly targeting Macs as well ... [Published Yahoo! News - Sep 07 2014]
First reported Sep 05 2014 - Updated Sep 05 2014 - 2 reports

Cyber Espionage Group Ported Windows Malware to Mac

Till now we have seen a series of different malware targeting Windows operating system and not Mac, thanks to Apple in way it safeguard its devices’ security. But with time, cyber criminals and malware authors have found ways to exploit Mac as well. ... [Published The Hacker News - Sep 05 2014]
First reported Sep 05 2014 - Updated Sep 05 2014 - 4 reports

Cyberespionage group starts using new Mac OS X backdoor program

A group of hackers known for past cyberespionage attacks against the U.S. Defense Industrial Base, as well as companies from the electronics and engineering sectors, has recently started using a backdoor program to target Mac OS X systems."The backdoor ... [Published Good Gear Guide - Sep 05 2014]

Quotes

"We wanted an Australian-wide partnership to gain access to complementary services that our clients regularly request. We are excited to be part of such a well-organised and strong company" they said
..."I've seen cases with intelligent, highly skilled engineering types, not remotely disgruntled, engineer a large-scale fix," she says. "They open a temporary link to implement a fix, and never de-provision it."

More Content

All (1135) | News (462) | Reports (0) | Blogs (661) | Audio/Video (10) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
UXC grows in online security market with Saltbu... [Published ZDNet - 8 mins ago]
Worrying About Wireless Internet [Published Security Magazine - 22 mins ago]
New EU Commission [Published American Institute for Contemporary German Studies - 9 hours ago]
The Future of IT in the Manufacturing Industry-... [Published Individual.com - 11 hours ago]
Revelations about spy agencies alert telcos to ... [Published Global Telecoms Business - 15 hours ago]
Unlike IBM, Lenovo to manufacture some System x... [Published InfoWorld - 19 hours ago]
UK Changes Its Mind on Iraq Intervention While ... [Published Defense Industry Daily - 22 hours ago]
Eugene Kaspersky: 'traditional crime is coming ... [Published Telegraph - Sep 30 2014]
Is Baidu a Cheap Knock-off or Investment-grade ... [Published Money Morning Australia - Sep 30 2014]
A Beginner's Guide to Cyberwarfare [Published Gizmodo - Sep 29 2014]
Import/export [Published Nuclear Engineering International - Sep 29 2014]
1-15 September 2014 Cyber Attacks Timeline [Published Hackmageddon.com - Sep 29 2014]
China says US hacking accusations are ‘totally ... [Published Modern Ghana - Sep 29 2014]
Canadian spy agency creates global hacking network [Published Axis of Logic - Sep 27 2014]
Cyberespionage Carries High Cost to U.S., Exper... [Published Seclists.org - Data Loss - Sep 26 2014]
In Cyberspace, Anonymity and Privacy are Not th... [Published Security Week - Sep 26 2014]
China accused of spying on Danish defence industry [Published Copenhagen Post - Sep 26 2014]
Cyber espionage carries high cost to U.S., expe... [Published Advisen FPN - Sep 26 2014]
Chinese, United States Hold Secret Cyber Talks [Published Washington Free Beacon - Sep 25 2014]
Five Ways Cyberterrorists Could Target the U.S. [Published Huffington Post - Sep 25 2014]
Dutch Detail Defense Spending Increases [Published Defense-Aerospace - Sep 25 2014]
Adobe to shut down Chinese R [Published IT News Australia - Sep 25 2014]
Adobe Systems to shut China R [Published Oman Observer - Sep 24 2014]
Security threats through the Cloud [Published CSO AU - Sep 24 2014]
Russian BlackEnergy malware targeting European ... [Published Security Affairs - Sep 24 2014]
A Visual Guide To North Korea’s Totalitarian Op... [Published Fast Company - Sep 24 2014]
Confidence Building for Cybersecurity between C... [Published China Institute of International Studies - Sep 23 2014]
Crackle Starts Production On Feature Film [Published Multichannel Online - Sep 23 2014]
Bridging the Gap: Carnegie Corporation of New Y... [Published Industrial Info Financials - Sep 23 2014]
Bridging the Gap: Carnegie Corporation of New Y... [Published CW Atlanta - Sep 23 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
1-15 September 2014 Cyber Attacks Timeline [Published Hackmageddon.com - Sep 29 2014]
This month will be probably remembered for the Home Depot breach. Yet another one caused by the same POS malware family that hit Target, with a similar dramatic extension: unfortunately the retailer believes that 56 million of credit cards could have ...
Cyberespionage Carries High Cost to U.S., Exper... [Published Seclists.org - Data Loss - Sep 26 2014]
Posted by Audrey McNeil on Sep 26 http://www.govtech.com/security/Cyber-Espionage-Carries-High-Cost-to-US-Expert-Says-.html In 2003, Chinese cyber espionage of the U.S. Department of Defense computersystem led to a theft of data equal to 20 percent ...
Chinese, United States Hold Secret Cyber Talks [Published Washington Free Beacon - Sep 25 2014]
Chinese officials held closed-door talks in Washington last week with U.S. cyber security counterparts despite Beijing’s formal cutoff of talks on the subject following the federal indictment of Chinese military hackers. “We exchanged views with Chinese ...
Russian BlackEnergy malware targeting European ... [Published Security Affairs - Sep 24 2014]
Ongoing cyber espionage campaign based on BlackEnergy malware hit targets in Poland, Ukraine and Belgium. Experts at ESET and F-Secure firms analyzed it. BlackEnergy malware is still in the wild representing a serious threat, a new ‘Lite’ version ...
Cyber risk management: A boardroom issue [Published Seclists.org - Data Loss - Sep 22 2014]
Posted by Audrey McNeil on Sep 22 http://www.scmagazineuk.com/cyber-risk-management-a-boardroom-issue/article/371440/ Cyber-security is an increasingly high profile and costly issue. Whetherstate sponsored cyber-attacks, cyber-espionage, hactivism ...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
China's Cyberspying [Published Wall Street Journal What's News - May 30 2014]
China denounces U.S. cyber espionage charges [Published Reuters Video: Top News - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Top News - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Business - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Top News - May 19 2014]
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.