Most Chinese takeovers in the resource sector do not pose a threat to national security, says the author of a new report on Chinese investment in Canada. Theodore Moran, a professor of international business at Georgetown University, says ...
Tags: resource sector, investment, Direct Investment, mining, oilsands
Three U.S.-based service providers that use equipment from Huawei Technologies said on Tuesday they take strong precautions to ensure the security of their networks, responding to a congressional report on Monday that said carriers should ...
Tags: Huawei Technologies, precautions, security, networks, Huawei, ZTE
Microsoft today patched 20 vulnerabilities in Word, Office, Windows, SharePoint Server, SQL Server and other products in its portfolio, including a critical bug in the company's popular Word program and another already used to attack the ...
Tags: Microsoft, vulnerabilities, Word, Office, Windows, SharePoint Server
The U.S. is trying to erect a national regime of secrecy and obfuscation where any government employee revealing sensitive information to a media organization can be sentenced to death, life imprisonment, or for espionage, and the ...
Tags: U.S., secrecy, obfuscation, media organization
The U.S. government needs a comprehensive doctrine addressing cybersecurity instead of the current patchwork of policies and agencies dealing with cyberthreats, according to a group of experts. The lack of an overarching cybersecurity ...
Tags: U.S.government, cybersecurity, cyberthreats, experts
A sophisticated cyber surveillance tool that monitors financial transactions with Middle Eastern banks was probably built by or under the auspices of a government, security researchers said today. Early Thursday, Moscow-based Kaspersky ...
Tags: cyber, financial transactions, Middle Eastern, banks, security
A US congressional panel examining the Chinese telecom firms Huawei and ZTE is concluding an investigation into whether the companies' equipment is a threat to US infrastructure and commercial confidentiality with a public hearing. In ...
Tags: telecom, Huawei, ZTE, infrastructure, commercial confidentiality
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
When you talk with the executives of most U.S. companies the subject often turns to the global market and the opportunities for growth that countries like China offer. However, as that conversation continues the next thing you often hear is ...
Tags: China, opportunities, Intellectual Property, theft of IP
A former programmer for Goldman Sachs has been charged again with pilfering sensitive source code despite his successful appeal in April of his federal court trial outcome. Sergey Aleynikov, a 42-year-old dual citizen of Russia and the ...
Kaspersky Lab has outlined key security trends of 2012 and presented their views on the core threats of 2013. The most notable predictions for the next year include the continued rise of targeted attacks, cyber-espionage and nation-state ...
Tags: malware, Kaspersky, cyber espionage, cyber
Microsoft today announced it will deliver seven security updates, one critical, to patch 20 vulnerabilities in Office, SharePoint Server, SQL Server, Windows and other parts of its product lineup. "It looks like an Office month," said ...
Tags: Microsoft, security updates, vulnerabilities, Office, SharePoint Server
Security researchers have uncovered a highly sophisticated, multi-tiered, global financial fraud ring that has attempted fraudulent transfers of up to 1.6bn from at least 60 banks This fraud empire, discovered by researchers from security ...
Tags: financial fraud, security, banking system, financial security
Cyber espionage is?nothing new.So a report from the Defense Security Service(DSS)about efforts in foreign countries to steal U.S.technology,intellectual property,trade secrets and proprietary information might sound like just more of the ...
Tags: Cyber espionage, DSS, Defense Industry
Three service providers that use equipment from Huawei have said they will take strong precautions to ensure the security of their networks in response to a congressional report on this week that said carriers should not buy from Huawei or ...
Tags: Congressional, Huawei, security, ZTE