A top Chinese official claims to have ‘mountains of data' showing evidence of hacking originating from the US. Huang Chengqing, director of the National Computer Network Emergency Response Technical Team/Coordination Center of China ...
Tags: Cyber Attacks, China, US
Threats from malware specifically targeting social media and the number of spam emails have both risen significantly in the first quarter of this year. That's according to the McAfee Threats Report: First Quarter 2013, which reveals that ...
Tags: Social Media Malware, McAfee
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems. The malware, which was ...
Tags: Computer Products, software
CSO - In January 2010, Google shocked the cyber world by confessing it had been the target of an advanced persistent threat lasting months and mounted by hackers connected to China's People Liberation Army. "[We] have evidence to suggest ...
Tags: Computer Products
A museum exhibition exploring how children use toys to play at war has opened. War Games opens on Saturday, May 25th and runs until March 2nd, 2014, at the V&A Museum of Childhood in London. The exhibition will "explore the fascinating ...
Tags: museum of childhood, toys, war games, war toys
The U.S. government should bar foreign companies that repeatedly steal or use stolen U.S. intellectual property from selling their products in the country, a new report recommended. About US$300 billion worth of intellectual property is ...
Tags: US, Foreign Firms, Intellectual Property
U.S. companies should be allowed to take aggressive countermeasures against hackers seeking to steal their intellectual property, contends the private Commission on the Theft of American Intellectual Property. The 100-page report, ...
Tags: IP, US, Computer Products
China's remarkable success at infiltrating U.S. government, military and corporate networks in recent years shouldn't be seen as a sign that the country is gaining on the U.S. lead in cybertechnology expertise. State-sponsored hacking ...
Tags: Computer Products, Hackers, networks
Security researchers from Trend Micro have uncovered an active cyber-espionage operation that so far has compromised computers belonging to government ministries, technology companies, media outlets, academic research institutions and ...
China's reputation for security may have been marred by recent U.S. accusations of state-sponsored hacking but the nation is still a safe place as a tech subcontractor for foreign businesses, according to one of China's largest IT ...
Tags: Computer Products, IT, IT outsourcing
A bill proposed in the U.S. Senate aims to block imports of products containing U.S. technology stolen online, a move that appears primarily directed at China. Introduced by four senators, the Deter Cyber Theft Act would require the U.S. ...
Tags: Computer Products, software
Chinese cyber espionage activities are fueling a rapid modernization of the country's defense and high tech industries, the Pentagon said in an unusually candid assessment of China's military and security developments last year. In a ...
Tags: Computer Products, Pentagon
Researchers following a cyber espionage campaign apparently bent on stealing drone-related technology secrets have found additional malware related to the targeted attacks. FireEye researchers have been tracking so-called "Operation ...
Tags: Malware, Cyber Attacks, Computer Products
While the majority of data breaches are the result of financially motivated cybercriminal attacks, cyberespionage activities are also responsible for a significant number of data theft incidents, according to a report that will be released ...
Tags: Computer Products, software
The US government is to introduce a "cyber espionage review" process into future purchases of IT after the measures were passed in a new funding law signed this week by President Obama. It follows reports in the press since the beginning ...
Tags: Cyber Espionage Review, IT, policy