Cyber Espionage

Type: Keyphrase
Name: Cyber Espionage
First reported 2 hours ago - Updated 2 hours ago - 1 reports

Cyber Security Video: Living in a surveillance state – Mikko Hypponen, Chief Research Officer, F-Secure

What does privacy mean in the post-Snowden world? Who do you trust with your company data? Are politicians the right people to formulate data policy, without prior knowledge? Are we in danger of ushering in an electronic totalitarian state? Can we trust ... [Published IP Expo Online - 2 hours ago]
First reported 4 hours ago - Updated 4 hours ago - 1 reports

Cyber-espionage is more difficult to pin to a state than spying in the physical world

The internet has brought us all closer together... unfortunately. GlebStock/ShutterstockWho’s in your network, checking out your data? The latest invasive digital creature is Sandworm , a piece of malware discovered to be using a previously unknown Windows ... [Published Conversation UK - 4 hours ago]
First reported 16 hours ago - Updated 9 hours ago - 1 reports

Feds: 500 million financial records hacked this year

WASHINGTON - Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building."We're in a day when a person can commit ... [Published Shreveport Times - 16 hours ago]
First reported 12 hours ago - Updated 12 hours ago - 1 reports

Govt looks to split TPG, FTTB providers; Russians hack NATO, Ukrainian govt; 7m Dropbox passwords ‘leaked’?

TPG would have to split into separate wholesale and retail operations in order to run its planned fibre-to-the-basement (FTTB) network if a plan drafted by the federal government is enacted.The government last week asked for public comment on a draft ... [Published Technology Decisions - 12 hours ago]
First reported 19 hours ago - Updated 19 hours ago - 1 reports

Technical analysis of the SandWorm Vulnerability (CVE-2014-4114)

Malware, Russian cyber-espionage campaign, and Microsoft PowerPoint are not necessarily three things one expects to go together and yet they did just recently. We take a technical dive into the world of the SandWorm vulnerability (CVE-2014-4114) ... [Published HP Security Research Blog - 19 hours ago]
First reported Oct 19 2014 - Updated Oct 20 2014 - 2 reports

China again blames US for disrupted cybersecurity talks

China claimed on Sunday the U.S. has derailed cybersecurity cooperation between the two countries and that it doesn’t tolerate hacking.The statement came a day after Yang Jiechi, a state councilor who deals with foreign affairs, held discussions on Saturday ... [Published CIO Magazine - Oct 20 2014]
First reported Oct 20 2014 - Updated Oct 20 2014 - 1 reports

1-15 October 2015 Cyber Attacks Timeline

Here we go with the first timeline of the main Cyber Attacks happened in October (according to my personal evaluation metric). Two weeks very active from an information security perspective. The list of attacks is quite long and heterogeneous, with ... [Published Hackmageddon.com - Oct 20 2014]
First reported Oct 20 2014 - Updated Oct 20 2014 - 1 reports

Hitachi Develops New Encryption Technology to Safeguard Critical Industrial Infrastructure

As industrial processes integrate with outside networks, cyber espionage has of lately been destabilizing critical industrial infrastructure putting various plants at risk. Now in order to counter such wide-scale sabotages, Hitachi has developed a new ... [Published World Industrial Reporter - Oct 20 2014]
First reported Oct 19 2014 - Updated Oct 20 2014 - 2 reports

US and China look to manage differences, cooperate against threats

America and China’s top diplomats stressed the need to manage differences and cooperate against global threats including Islamic State and Ebola, as they sought to warm the mood between their countries ahead of a summit next month.“There are many areas ... [Published Dhaka Tribune - Oct 19 2014]
First reported Oct 19 2014 - Updated Oct 19 2014 - 1 reports

There's A Silver Lining In Dealing with Cyber Espionage Groups

Shared threat intelligence helps connect attacks from the same threat actor and indetify the different tools they useCyber-attacks from threat actors believed to operate from China and Russia under governmental supervision have captured most of the headlines ... [Published Softpedia - Oct 19 2014]
First reported Oct 19 2014 - Updated Oct 19 2014 - 1 reports

Moscow linked to sophisticated cyber espionage attack using Windows zero-day flaw

Sandworm targets/iSightCovert Russian cyber espionage agents operating since 2009 stole large amounts of data from government and private networks in the United States and across Europe by exploiting a zero day flaw in Microsoft’s Windows operating s ... [Published Flash Critic - Oct 19 2014]
First reported Oct 19 2014 - Updated Oct 19 2014 - 1 reports

Congressional report reveals Chinese cyber espionage continues

China’s large-scale campaign of cyber espionage against the United States is continuing despite U.S. government efforts to negotiate an end to the problem.“Since at least the mid-2000s, the Chinese government has conducted large-scale cyber espionage ... [Published Flash Critic - Oct 19 2014]

Quotes

"This is clearly a malicious attack on Apple in an effort to gain access to usernames and passwords and consequently all data stored on iCloud such as iMessages, photos, contacts, etc" Greatfire wrote in the blog
"Five years ago, we would have focused on whether the hacker) was in the United States where we could get our hands on them," Grasso said. "Today, we're going to team up with our overseas law enforcement partners and go after them."
In ThreatTrack Security's recent survey of IT security professionals in the energy sector, "Energy Companies and Financial Services Firms Remain Vulnerable to Data-Breaching Malware" we found, somewhat surprisingly, that many respondents know their organizations are vulnerable...
The annual report from the Australian Security Intelligence Organisation (ASIO) shows there has been an increase in what it describes as "hostile cyber espionage activity against Australian Government and private sector systems"

More Content

All (1204) | News (570) | Reports (0) | Blogs (622) | Audio/Video (10) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Cyber Security Video: Living in a surveillance ... [Published IP Expo Online - 2 hours ago]
China 'Hacked' Apple's iCloud Service to Snoop ... [Published International Business Times UK - 4 hours ago]
Cyber-espionage is more difficult to pin to a s... [Published Conversation UK - 4 hours ago]
The real-life hacking behind Watch Dogs’ virtua... [Published IndiaVision - 8 hours ago]
Officials: 500M financial records hacked [Published Pittsburgh Tribune Review - 9 hours ago]
Americans at Wal-Mart funding Beijing spies? [Published WorldNetDaily - 9 hours ago]
Govt looks to split TPG, FTTB providers; Russia... [Published Technology Decisions - 12 hours ago]
Officials warn 500 million financial records ha... [Published USA Today - 13 hours ago]
How to Stop Malware Attacks on SCADA Systems [Published Electric Light & Power - 14 hours ago]
Feds: 500 million financial records hacked this... [Published Shreveport Times - 16 hours ago]
Novetta Solutions Develops Cyber Security Coali... [Published WashingtonExec - 18 hours ago]
Technical analysis of the SandWorm Vulnerabilit... [Published HP Security Research Blog - 19 hours ago]
ASIO reveals Australia faces risk from foreign ... [Published ABC Online - 20 hours ago]
Morning Security Brief: Nigeria Ebola-Free, Cap... [Published Security Management Online - 21 hours ago]
Microsoft pulls second Patch Tuesday update in ... [Published TheInquirer.net - 23 hours ago]
Sandworm Team Went After Firms Running SCADA [Published Infosecurity - Latest - Oct 20 2014]
1-15 October 2015 Cyber Attacks Timeline [Published Hackmageddon.com - Oct 20 2014]
Hitachi Develops New Encryption Technology to S... [Published World Industrial Reporter - Oct 20 2014]
China again blames US for disrupted cybersecuri... [Published CIO Magazine - Oct 20 2014]
There's A Silver Lining In Dealing with Cyber E... [Published Softpedia - Oct 19 2014]
US and China look to manage differences, cooper... [Published Dhaka Tribune - Oct 19 2014]
China, US pledge cooperation on important issues [Published Shanghai Daily - Oct 19 2014]
US-China spying allegations saga [Published Press tv - Oct 19 2014]
Moscow linked to sophisticated cyber espionage ... [Published Flash Critic - Oct 19 2014]
Congressional report reveals Chinese cyber espi... [Published Flash Critic - Oct 19 2014]
US, China pledge to ‘manage’ differences [Published The Hill - Oct 18 2014]
US and China look to manage differences, cooper... [Published Mail Online UK - Oct 18 2014]
Malvertising campaigns hit US military industry... [Published Security Affairs - Oct 18 2014]
Another FBI Cyber Attack Warning for US Businesses [Published Virtual Strategy Magazine - Oct 18 2014]
Another FBI Cyber Attack Warning for US Businesses [Published Bio-Medicine - Oct 18 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Technical analysis of the SandWorm Vulnerabilit... [Published HP Security Research Blog - 19 hours ago]
Malware, Russian cyber-espionage campaign, and Microsoft PowerPoint are not necessarily three things one expects to go together and yet they did just recently. We take a technical dive into the world of the SandWorm vulnerability (CVE-2014-4114) ...
1-15 October 2015 Cyber Attacks Timeline [Published Hackmageddon.com - Oct 20 2014]
Here we go with the first timeline of the main Cyber Attacks happened in October (according to my personal evaluation metric). Two weeks very active from an information security perspective. The list of attacks is quite long and heterogeneous, with ...
Malvertising campaigns hit US military industry... [Published Security Affairs - Oct 18 2014]
A new wave of malvertising attacks finalized to cyber espionage is targeting military contractors to military secrets and intellectual property. Security experts at security company Invincea have uncovered a new  malvertising campaign used as a attack ...
Patching Poodles and Digging for Sandworms: Why... [Published Speaking of Security - The RSA Blog and Podcast - Oct 17 2014]
“Sitting in a bunker here behind my wall, waiting for the worms to come. In perfect isolation here behind my wall, waiting for the worms to come.” -From Waiting for the Worms by Pink Floyd This week had a two-for-one special with the discovery of ...
Russian hackers used Windows bug to hack NATO a... [Published HackRead - Oct 16 2014]
Russian Hackers hacked NATO, EU and Ukrainian Firms- Claims iSight – Cyber intelligence firm blame Zero-day for the hack. A potential security flaw in MS Windows operating system has given an opportunity to Russian hackers. According to a ...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
China's Cyberspying [Published Wall Street Journal What's News - May 30 2014]
China denounces U.S. cyber espionage charges [Published Reuters Video: Top News - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Top News - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Business - May 20 2014]
Deal making frenzy grips Wall Street [Published Reuters Video: Top News - May 19 2014]
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.