China’s state-controlled press is accusing Cisco of helping the U.S. government in cyberespionage. The criticisms come a week after the U.S. indicted five Chinese military personnel for allegedly hacking into several U.S. companies ...
Tags: Cyberwar Efforts, cyberespionage
A suspected Iran-based hacking group known for defacing websites has shown increased ambition over the past few months, targeting U.S. defence contractors and Iranian dissidents, according to a new report from security company FireEye. ...
Tags: Computer Products, IT
Three U.S. lawmakers have introduced legislation that would allow President Barack Obama's administration to deny U.S. travel visas to cyberattackers sponsored by foreign governments and to freeze their U.S.-based assets. The Cyber ...
Tags: Bill, Cyberattacks, Computer Products
An ongoing cyberespionage campaign compromised over 350 high-profile victims from more than 40 countries over the past eight years, including political activists, research centers, governmental institutions, embassies, military contractors ...
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. The malware, which was ...
Tags: Computer Products, software
Designs for more than two dozen advanced U.S. weapon systems, including missile defenses, combat aircraft and ships, were reportedly accessed by Chinese hackers. The systems were listed in a previously undisclosed section of a report ...
Tags: US, Chinese Hackers, Weapons System
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products
A recent intrusion on the computer network of Norwegian telecommunications company Telenor was the result of a large cyberespionage operation of Indian origin that for the past few years has targeted business, government and political ...
Tags: Computer Products, software
Security researchers from Trend Micro have uncovered an active cyberespionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
Tags: Computer Products, software
AutoIt, a scripting language for automating Windows interface interactions, is increasingly being used by malware developers thanks to its flexibility and low learning curve, according to security researchers from Trend Micro and ...
Chinese cyber espionage activities are fueling a rapid modernization of the country's defense and high tech industries, the Pentagon said in an unusually candid assessment of China's military and security developments last year. In a ...
Tags: Computer Products, Pentagon
After facing a congressional battering over security concerns, Huawei's carrier networking group is no longer focused on the U.S. market, and instead expects to find ample business in other parts of the world. "Apparently, due to whatever ...
While the majority of data breaches are the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be released ...
Tags: Computer Products, software
The U.S. House of Representatives has voted to approve a controversial cyberthreat information-sharing bill, despite opposition from the White House and several privacy and digital rights groups. The House on Thursday voted 288-127 to ...
Tags: CISPA, Privacy Objections
A little-publicized provision in a U.S. government budget resolution that largely prohibits four agencies from using Chinese-made IT products could backfire, several tech trade groups said. The provision, in a 2013 budget resolution ...