Reporters Without Borders named five countries that regularly spy on journalists and dissidents, a practice the group contends is made possible with advanced technology from private companies. The Paris-based group, which is an ...
A top U.S. official called on China to investigate and stop cyberattacks, which he said pose a growing threat to the countries' economic relationship. Tom Donilon, U.S. President Barack Obama's national security advisor, said the U.S. ...
China's plan to create a substantial outsourcing industry was hit with another blow last month with the release of a report that laid bare, in ways never seen before, the extent of the security risks of working in the country. Ten years ...
Tags: substantial outsourcing industry, China, security risk
The U.S. is dangerously unprepared to face a full-scale cyberconflict launched by a peer adversary, a report by the military's Defense Science Board (DSB) warns. The report, released in January, and first reported on by The Washington ...
China signaled it wants to reduce its dependence on Google's Android OS, alleging that the U.S. company has discriminated against local companies over the use of the mobile operating system. "Our country's mobile operating system research ...
Tags: China, Google, Android OS
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
China has for years been developing an IT outsourcing industry aimed at bringing in business from the U.S. and Europe. It has succeeded, but then again it hasn't thrived and now may face more barriers. China's IT and business process ...
Tags: China, IT outsourcing, outsourcing industry
China's Ministry of National Defense on Wednesday refuted the accusations that the nation's military supports cyberespionage, and said a recent security report backing the claims used scientifically flawed evidence. The ministry made the ...
Tags: cyberespionage, cyberattacks, cyber
A new report traces a large cybersecurity threat group to China's People's Liberation Army, specifically a unit that goes under the cover name "Unit 61398." Security company Mandiant said in a report released Tuesday that an Advanced ...
Tags: Report, Cyberspying Group, China's Army
Apple says it has been hit by hackers who wormed their way into the California company's system but evidently failed to steal any data. The maker of iPhones, iPads, iPods, and Macintosh computers said it is working with law enforcement ...
Tags: APPLE, iPhones, iPads, iPods, Macintosh computers
The US is vulnerable to cyberattacks that could shut down financial services or destroy information that companies need for daily operations, the chairman of the US House Intelligence Committee says. Mike Rogers said 95 per cent of ...
Tags: Cyberattacks, US, financial services
Two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill that allows private companies to share customers' personal information related to a wide range of cyberthreats with government agencies. Representatives Mike ...
Tags: cybersecurity, U.S., bill
In what is turning out to be a repeat of last year, privacy rights groups launched an assault against the Cyber Intelligence Sharing and Protection Act (CISPA), barely a day after the controversial legislation was reintroduced in Congress ...
Tags: privacy rights, CISPA, controversial legislation, US
Countries that have signed on to international cybersecurity agreements tend to have fewer malware infections among their citizens, according to new research released by Microsoft and George Washington University. Countries that have ...
Tags: international cybersecurity agreements, malware infections
A secret review of American policies governing the use of cyberweapons has concluded that President Barack Obama has the broad power to order pre-emptive strikes on any country preparing to launch a major digital attack against the U.S. ...
Tags: cyberweapons, broad power, digital attack